From 89f62ad5b9c27fda80f186f4ae9c60b2cdb3a4f4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 16 Jun 2022 13:01:51 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/20xxx/CVE-2017-20053.json | 16 +++++++++++----- 2017/20xxx/CVE-2017-20054.json | 16 +++++++++++----- 2017/20xxx/CVE-2017-20055.json | 14 ++++++++++---- 2017/20xxx/CVE-2017-20056.json | 14 ++++++++++---- 2020/36xxx/CVE-2020-36547.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36548.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36549.json | 18 ++++++++++++++++++ 7 files changed, 96 insertions(+), 18 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36547.json create mode 100644 2020/36xxx/CVE-2020-36548.json create mode 100644 2020/36xxx/CVE-2020-36549.json diff --git a/2017/20xxx/CVE-2017-20053.json b/2017/20xxx/CVE-2017-20053.json index 1a9484a0ab1..b458ee11a8c 100644 --- a/2017/20xxx/CVE-2017-20053.json +++ b/2017/20xxx/CVE-2017-20053.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -58,19 +58,25 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/99" + "url": "http://seclists.org/fulldisclosure/2017/Feb/99", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/99" }, { - "url": "https:\/\/sumofpwn.nl\/advisory\/2016\/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html" + "url": "https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html", + "refsource": "MISC", + "name": "https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html" }, { - "url": "https:\/\/vuldb.com\/?id.97387" + "url": "https://vuldb.com/?id.97387", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97387" } ] } diff --git a/2017/20xxx/CVE-2017-20054.json b/2017/20xxx/CVE-2017-20054.json index dce2dab6167..c7698234d63 100644 --- a/2017/20xxx/CVE-2017-20054.json +++ b/2017/20xxx/CVE-2017-20054.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -58,19 +58,25 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/99" + "url": "http://seclists.org/fulldisclosure/2017/Feb/99", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/99" }, { - "url": "https:\/\/sumofpwn.nl\/advisory\/2016\/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html" + "url": "https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html", + "refsource": "MISC", + "name": "https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html" }, { - "url": "https:\/\/vuldb.com\/?id.97388" + "url": "https://vuldb.com/?id.97388", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97388" } ] } diff --git a/2017/20xxx/CVE-2017-20055.json b/2017/20xxx/CVE-2017-20055.json index cb0d67c8331..0a7a36f5d71 100644 --- a/2017/20xxx/CVE-2017-20055.json +++ b/2017/20xxx/CVE-2017-20055.json @@ -58,19 +58,25 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/100" + "url": "http://seclists.org/fulldisclosure/2017/Feb/100", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/100" }, { - "url": "https:\/\/sumofpwn.nl\/advisory\/2016\/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html" + "url": "https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html", + "refsource": "MISC", + "name": "https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html" }, { - "url": "https:\/\/vuldb.com\/?id.97389" + "url": "https://vuldb.com/?id.97389", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97389" } ] } diff --git a/2017/20xxx/CVE-2017-20056.json b/2017/20xxx/CVE-2017-20056.json index 8b0da886efe..fa5c6f98e5c 100644 --- a/2017/20xxx/CVE-2017-20056.json +++ b/2017/20xxx/CVE-2017-20056.json @@ -58,19 +58,25 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/98" + "url": "http://seclists.org/fulldisclosure/2017/Feb/98", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/98" }, { - "url": "https:\/\/sumofpwn.nl\/advisory\/2016\/stored_cross_site_scripting_vulnerability_in_user_login_log_wordpress_plugin.html" + "url": "https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_user_login_log_wordpress_plugin.html", + "refsource": "MISC", + "name": "https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_user_login_log_wordpress_plugin.html" }, { - "url": "https:\/\/vuldb.com\/?id.97386" + "url": "https://vuldb.com/?id.97386", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97386" } ] } diff --git a/2020/36xxx/CVE-2020-36547.json b/2020/36xxx/CVE-2020-36547.json new file mode 100644 index 00000000000..7312d0077e2 --- /dev/null +++ b/2020/36xxx/CVE-2020-36547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36548.json b/2020/36xxx/CVE-2020-36548.json new file mode 100644 index 00000000000..8559dc7bee3 --- /dev/null +++ b/2020/36xxx/CVE-2020-36548.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36548", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36549.json b/2020/36xxx/CVE-2020-36549.json new file mode 100644 index 00000000000..4df622c9078 --- /dev/null +++ b/2020/36xxx/CVE-2020-36549.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36549", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file