diff --git a/2017/18xxx/CVE-2017-18926.json b/2017/18xxx/CVE-2017-18926.json index 59917a9db2a..91d686917ad 100644 --- a/2017/18xxx/CVE-2017-18926.json +++ b/2017/18xxx/CVE-2017-18926.json @@ -86,6 +86,16 @@ "refsource": "MLIST", "name": "[oss-security] 20201114 Re: Buffer Overflow in raptor widely unfixed in Linux distros", "url": "http://www.openwall.com/lists/oss-security/2020/11/14/2" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros", + "url": "http://www.openwall.com/lists/oss-security/2020/11/16/3" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros", + "url": "http://www.openwall.com/lists/oss-security/2020/11/16/2" } ] } diff --git a/2020/26xxx/CVE-2020-26217.json b/2020/26xxx/CVE-2020-26217.json index 1a19554a438..5c213769879 100644 --- a/2020/26xxx/CVE-2020-26217.json +++ b/2020/26xxx/CVE-2020-26217.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. \nThe issue is fixed in version 1.4.14." + "value": "XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14." } ] }, diff --git a/2020/26xxx/CVE-2020-26225.json b/2020/26xxx/CVE-2020-26225.json index 21b26e48f74..ebe4805c7e9 100644 --- a/2020/26xxx/CVE-2020-26225.json +++ b/2020/26xxx/CVE-2020-26225.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In PrestaShop Product Comments before version 4.2.0, an attacker could inject malicious web code into the users' web browsers by creating a malicious link.\n\nThe problem was introduced in version 4.0.0 and is fixed in 4.2.0" + "value": "In PrestaShop Product Comments before version 4.2.0, an attacker could inject malicious web code into the users' web browsers by creating a malicious link. The problem was introduced in version 4.0.0 and is fixed in 4.2.0" } ] },