"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-08-28 18:01:34 +00:00
parent 2e7fd402d9
commit 9e2cdec13a
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 12 additions and 2 deletions

View File

@ -35,7 +35,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "in Scratch Login (MediaWiki extension) before version 1.1, any account can be logged into by using the same username with leading, trailing, or repeated underscore(s), since those are treated as whitespace and trimmed by MediaWiki.\n\nThis affects all users on any wiki using this extension.\n\nSince version 1.1, comments by users whose usernames would be trimmed on MediaWiki are ignored when searching for the verification code." "value": "in Scratch Login (MediaWiki extension) before version 1.1, any account can be logged into by using the same username with leading, trailing, or repeated underscore(s), since those are treated as whitespace and trimmed by MediaWiki. This affects all users on any wiki using this extension. Since version 1.1, comments by users whose usernames would be trimmed on MediaWiki are ignored when searching for the verification code."
} }
] ]
}, },

View File

@ -35,7 +35,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Version 1.1.6-free of Chameleon Mini Live Debugger on Google Play Store may have had it's sources or permissions tampered by a malicious actor. The official maintainer of the package is recommending all users upgrade to v1.1.8 as soon as possible.\n\nFor more information, review the referenced GitHub Security Advisory." "value": "Version 1.1.6-free of Chameleon Mini Live Debugger on Google Play Store may have had it's sources or permissions tampered by a malicious actor. The official maintainer of the package is recommending all users upgrade to v1.1.8 as soon as possible. For more information, review the referenced GitHub Security Advisory."
} }
] ]
}, },

View File

@ -56,6 +56,11 @@
"url": "https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html", "url": "https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html" "name": "https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"url": "https://www.jinsonvarghese.com/stored-xss-vulnerability-in-nagios-log-server/", "url": "https://www.jinsonvarghese.com/stored-xss-vulnerability-in-nagios-log-server/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.jinsonvarghese.com/stored-xss-vulnerability-in-nagios-log-server/" "name": "https://www.jinsonvarghese.com/stored-xss-vulnerability-in-nagios-log-server/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158992/Nagios-Log-Server-2.1.6-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/158992/Nagios-Log-Server-2.1.6-Cross-Site-Scripting.html"
} }
] ]
} }