From 9f763e9d7c634479c4866109e19d732cecefa927 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 29 Dec 2020 17:01:44 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/28xxx/CVE-2020-28275.json | 55 +++++++++++++++++++++++++++++++-- 2020/28xxx/CVE-2020-28276.json | 55 +++++++++++++++++++++++++++++++-- 2020/28xxx/CVE-2020-28277.json | 55 +++++++++++++++++++++++++++++++-- 2020/29xxx/CVE-2020-29470.json | 56 ++++++++++++++++++++++++++++++---- 2020/29xxx/CVE-2020-29471.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35770.json | 18 +++++++++++ 2020/35xxx/CVE-2020-35771.json | 18 +++++++++++ 7 files changed, 292 insertions(+), 21 deletions(-) create mode 100644 2020/35xxx/CVE-2020-35770.json create mode 100644 2020/35xxx/CVE-2020-35771.json diff --git a/2020/28xxx/CVE-2020-28275.json b/2020/28xxx/CVE-2020-28275.json index 9d37333fcd8..d3dbe70ce70 100644 --- a/2020/28xxx/CVE-2020-28275.json +++ b/2020/28xxx/CVE-2020-28275.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28275", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "cache-base", + "version": { + "version_data": [ + { + "version_value": "0.7.0, 0.7.1, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 1.0.0, 1.0.1, 2.0.0, 2.0.1, 2.0.2, 3.0.0, 3.0.1, 4.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Prototype Pollution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/jonschlinkert/cache-base/blob/e4d50b78a57099aedabce9baff8c1b3212099c99/index.js#L71", + "url": "https://github.com/jonschlinkert/cache-base/blob/e4d50b78a57099aedabce9baff8c1b3212099c99/index.js#L71" + }, + { + "refsource": "CONFIRM", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28275", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28275" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prototype pollution vulnerability in 'cache-base' versions 0.7.0 through 4.0.0 allows attacker to cause a denial of service and may lead to remote code execution." } ] } diff --git a/2020/28xxx/CVE-2020-28276.json b/2020/28xxx/CVE-2020-28276.json index 921aac2f6fd..e91cd7a5106 100644 --- a/2020/28xxx/CVE-2020-28276.json +++ b/2020/28xxx/CVE-2020-28276.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28276", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "deep-set", + "version": { + "version_data": [ + { + "version_value": "1.0.0, 1.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Prototype Pollution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/klaemo/deep-set/blob/103d650b3de1f5c6cf051236347ba59e7274cd07/index.js#L39", + "url": "https://github.com/klaemo/deep-set/blob/103d650b3de1f5c6cf051236347ba59e7274cd07/index.js#L39" + }, + { + "refsource": "CONFIRM", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28276", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28276" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prototype pollution vulnerability in 'deep-set' versions 1.0.0 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution." } ] } diff --git a/2020/28xxx/CVE-2020-28277.json b/2020/28xxx/CVE-2020-28277.json index 7d338140b07..02e23eef042 100644 --- a/2020/28xxx/CVE-2020-28277.json +++ b/2020/28xxx/CVE-2020-28277.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28277", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "dset", + "version": { + "version_data": [ + { + "version_value": "2.0.1, 2.0.0, 1.0.1, 1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Prototype Pollution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/lukeed/dset/blob/50a6ead172d1466a96035eff00f8eb465ccd050a/src/index.js#L6", + "url": "https://github.com/lukeed/dset/blob/50a6ead172d1466a96035eff00f8eb465ccd050a/src/index.js#L6" + }, + { + "refsource": "CONFIRM", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28277", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28277" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prototype pollution vulnerability in 'dset' versions 1.0.0 through 2.0.1 allows attacker to cause a denial of service and may lead to remote code execution." } ] } diff --git a/2020/29xxx/CVE-2020-29470.json b/2020/29xxx/CVE-2020-29470.json index f7db46af295..2795739d8af 100644 --- a/2020/29xxx/CVE-2020-29470.json +++ b/2020/29xxx/CVE-2020-29470.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29470", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29470", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Subject field of mail. This vulnerability can allow an attacker to inject the XSS payload in the Subject field of the mail and each time any user will open that mail of the website, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49099", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49099" } ] } diff --git a/2020/29xxx/CVE-2020-29471.json b/2020/29xxx/CVE-2020-29471.json index 90ad0dff15c..93d1bb2f651 100644 --- a/2020/29xxx/CVE-2020-29471.json +++ b/2020/29xxx/CVE-2020-29471.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29471", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29471", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Profile Image. An admin can upload a profile image as a malicious code using JavaScript. Whenever anyone will see the profile picture, the code will execute and XSS will trigger." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49098", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49098" } ] } diff --git a/2020/35xxx/CVE-2020-35770.json b/2020/35xxx/CVE-2020-35770.json new file mode 100644 index 00000000000..b066d6631d5 --- /dev/null +++ b/2020/35xxx/CVE-2020-35770.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35770", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35771.json b/2020/35xxx/CVE-2020-35771.json new file mode 100644 index 00000000000..ba688fc7ec7 --- /dev/null +++ b/2020/35xxx/CVE-2020-35771.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35771", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file