From ab209213c7c4b939b13c6405f238785a262191d1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 8 Jan 2020 23:01:05 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2011/5xxx/CVE-2011-5018.json | 58 +++++++++++++++++++++++++++++++-- 2011/5xxx/CVE-2011-5247.json | 48 ++++++++++++++++++++++++++-- 2011/5xxx/CVE-2011-5250.json | 53 ++++++++++++++++++++++++++++-- 2011/5xxx/CVE-2011-5266.json | 48 ++++++++++++++++++++++++++-- 2020/6xxx/CVE-2020-6617.json | 62 ++++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6618.json | 62 ++++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6619.json | 62 ++++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6620.json | 62 ++++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6621.json | 62 ++++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6622.json | 62 ++++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6623.json | 62 ++++++++++++++++++++++++++++++++++++ 11 files changed, 633 insertions(+), 8 deletions(-) create mode 100644 2020/6xxx/CVE-2020-6617.json create mode 100644 2020/6xxx/CVE-2020-6618.json create mode 100644 2020/6xxx/CVE-2020-6619.json create mode 100644 2020/6xxx/CVE-2020-6620.json create mode 100644 2020/6xxx/CVE-2020-6621.json create mode 100644 2020/6xxx/CVE-2020-6622.json create mode 100644 2020/6xxx/CVE-2020-6623.json diff --git a/2011/5xxx/CVE-2011-5018.json b/2011/5xxx/CVE-2011-5018.json index acca08f654a..18fe28e9e88 100644 --- a/2011/5xxx/CVE-2011-5018.json +++ b/2011/5xxx/CVE-2011-5018.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5018", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Koala Framework before 2011-11-21 has XSS via the request_uri parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.cloudscan.me/2011/12/cve-2011-5018-koala-framework-xss.html", + "refsource": "MISC", + "name": "http://www.cloudscan.me/2011/12/cve-2011-5018-koala-framework-xss.html" + }, + { + "refsource": "MISC", + "name": "https://groups.google.com/forum/#!topic/koala-framework-dev/wgHDD7N7qhk", + "url": "https://groups.google.com/forum/#!topic/koala-framework-dev/wgHDD7N7qhk" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/koala-framework/koala-framework/commit/59f81ea6bd8ef96c04a706a3ca453cd656284faa", + "url": "https://github.com/koala-framework/koala-framework/commit/59f81ea6bd8ef96c04a706a3ca453cd656284faa" } ] } diff --git a/2011/5xxx/CVE-2011-5247.json b/2011/5xxx/CVE-2011-5247.json index 1b758763437..8d690edc952 100644 --- a/2011/5xxx/CVE-2011-5247.json +++ b/2011/5xxx/CVE-2011-5247.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5247", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Snare for Linux before 1.7.0 has password disclosure because the rendered page contains the field RemotePassword." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.securityfocus.com/archive/1/525003", + "refsource": "MISC", + "name": "https://www.securityfocus.com/archive/1/525003" } ] } diff --git a/2011/5xxx/CVE-2011-5250.json b/2011/5xxx/CVE-2011-5250.json index cc1e5f8fc96..41fac9ddd53 100644 --- a/2011/5xxx/CVE-2011-5250.json +++ b/2011/5xxx/CVE-2011-5250.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5250", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Snare for Linux before 1.7.0 has CSRF in the web interface." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80613", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80613" + }, + { + "url": "https://www.securityfocus.com/archive/1/525002", + "refsource": "MISC", + "name": "https://www.securityfocus.com/archive/1/525002" } ] } diff --git a/2011/5xxx/CVE-2011-5266.json b/2011/5xxx/CVE-2011-5266.json index ef8ab169d5d..b952df6552d 100644 --- a/2011/5xxx/CVE-2011-5266.json +++ b/2011/5xxx/CVE-2011-5266.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5266", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Imperva SecureSphere Web Application Firewall (WAF) before 12-august-2010 allows SQL injection filter bypass." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seclists.org/fulldisclosure/2011/May/163", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2011/May/163" } ] } diff --git a/2020/6xxx/CVE-2020-6617.json b/2020/6xxx/CVE-2020-6617.json new file mode 100644 index 00000000000..5b63d3ab91e --- /dev/null +++ b/2020/6xxx/CVE-2020-6617.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6617", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_int." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nothings/stb/issues/864", + "refsource": "MISC", + "name": "https://github.com/nothings/stb/issues/864" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6618.json b/2020/6xxx/CVE-2020-6618.json new file mode 100644 index 00000000000..01a3687391c --- /dev/null +++ b/2020/6xxx/CVE-2020-6618.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6618", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__find_table." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nothings/stb/issues/866", + "refsource": "MISC", + "name": "https://github.com/nothings/stb/issues/866" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6619.json b/2020/6xxx/CVE-2020-6619.json new file mode 100644 index 00000000000..44a9ab82621 --- /dev/null +++ b/2020/6xxx/CVE-2020-6619.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6619", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "stb stb_truetype.h through 1.22 has an assertion failure in stbtt__buf_seek." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nothings/stb/issues/863", + "refsource": "MISC", + "name": "https://github.com/nothings/stb/issues/863" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6620.json b/2020/6xxx/CVE-2020-6620.json new file mode 100644 index 00000000000..4eed648d5fc --- /dev/null +++ b/2020/6xxx/CVE-2020-6620.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6620", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nothings/stb/issues/868", + "refsource": "MISC", + "name": "https://github.com/nothings/stb/issues/868" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6621.json b/2020/6xxx/CVE-2020-6621.json new file mode 100644 index 00000000000..d0a6f85b851 --- /dev/null +++ b/2020/6xxx/CVE-2020-6621.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6621", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "stb stb_truetype.h through 1.22 has a heap-based buffer over-read in ttUSHORT." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nothings/stb/issues/867", + "refsource": "MISC", + "name": "https://github.com/nothings/stb/issues/867" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6622.json b/2020/6xxx/CVE-2020-6622.json new file mode 100644 index 00000000000..7301e7d8f89 --- /dev/null +++ b/2020/6xxx/CVE-2020-6622.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6622", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_peek8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nothings/stb/issues/869", + "refsource": "MISC", + "name": "https://github.com/nothings/stb/issues/869" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6623.json b/2020/6xxx/CVE-2020-6623.json new file mode 100644 index 00000000000..1e870328940 --- /dev/null +++ b/2020/6xxx/CVE-2020-6623.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6623", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_get_index." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nothings/stb/issues/865", + "refsource": "MISC", + "name": "https://github.com/nothings/stb/issues/865" + } + ] + } +} \ No newline at end of file