From 91930aea72ecf5e5cfacdbf5aa79054d1969b01d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 13 Apr 2020 15:01:17 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/11xxx/CVE-2019-11516.json | 5 +++ 2019/16xxx/CVE-2019-16336.json | 5 +++ 2020/11xxx/CVE-2020-11673.json | 61 ++++++++++++++++++++++++++++++---- 2020/9xxx/CVE-2020-9478.json | 61 ++++++++++++++++++++++++++++++---- 4 files changed, 120 insertions(+), 12 deletions(-) diff --git a/2019/11xxx/CVE-2019-11516.json b/2019/11xxx/CVE-2019-11516.json index 877ffa04f8a..c41281ef48a 100644 --- a/2019/11xxx/CVE-2019-11516.json +++ b/2019/11xxx/CVE-2019-11516.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://www.techrepublic.com/article/android-security-bulletin-august-2019-what-you-need-to-know/", "url": "https://www.techrepublic.com/article/android-security-bulletin-august-2019-what-you-need-to-know/" + }, + { + "refsource": "MISC", + "name": "https://community.cypress.com/thread/53681", + "url": "https://community.cypress.com/thread/53681" } ] } diff --git a/2019/16xxx/CVE-2019-16336.json b/2019/16xxx/CVE-2019-16336.json index b3a5cc05a30..275413abdba 100644 --- a/2019/16xxx/CVE-2019-16336.json +++ b/2019/16xxx/CVE-2019-16336.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://www.youtube.com/watch?v=Iw8sIBLWE_w", "url": "https://www.youtube.com/watch?v=Iw8sIBLWE_w" + }, + { + "refsource": "MISC", + "name": "https://community.cypress.com/thread/53680", + "url": "https://community.cypress.com/thread/53680" } ] } diff --git a/2020/11xxx/CVE-2020-11673.json b/2020/11xxx/CVE-2020-11673.json index eea1fdc4ba2..41f527d3d50 100644 --- a/2020/11xxx/CVE-2020-11673.json +++ b/2020/11xxx/CVE-2020-11673.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11673", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11673", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Responsive Poll through 1.3.4 for Wordpress. It allows an unauthenticated user to manipulate polls, e.g., delete, clone, or view a hidden poll. This is due to the usage of the callback wp_ajax_nopriv function in Includes/Total-Soft-Poll-Ajax.php for sensitive operations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/poll-wp/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/poll-wp/#developers" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/pak0s/05a0e517aeff4b1422d1a93f59718459", + "url": "https://gist.github.com/pak0s/05a0e517aeff4b1422d1a93f59718459" } ] } diff --git a/2020/9xxx/CVE-2020-9478.json b/2020/9xxx/CVE-2020-9478.json index c465f7347f4..62bc6accd7c 100644 --- a/2020/9xxx/CVE-2020-9478.json +++ b/2020/9xxx/CVE-2020-9478.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-9478", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-9478", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Rubrik 5.0.3-2296. An OS command injection vulnerability allows an authenticated attacker to remotely execute arbitrary code on Rubrik-managed systems." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.rubrik.com", + "refsource": "MISC", + "name": "https://www.rubrik.com" + }, + { + "refsource": "CONFIRM", + "name": "https://www.rubrik.com/en/advisories/rbk20200316s0012", + "url": "https://www.rubrik.com/en/advisories/rbk20200316s0012" } ] }