From b9c4bb452b6f91c27a1455731d5468cef581c2e2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 3 Feb 2020 21:01:18 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/16xxx/CVE-2019-16451.json | 5 +++ 2019/20xxx/CVE-2019-20444.json | 10 ++++++ 2019/20xxx/CVE-2019-20445.json | 10 ++++++ 2020/8xxx/CVE-2020-8591.json | 62 ++++++++++++++++++++++++++++++++++ 2020/8xxx/CVE-2020-8592.json | 62 ++++++++++++++++++++++++++++++++++ 2020/8xxx/CVE-2020-8593.json | 18 ++++++++++ 6 files changed, 167 insertions(+) create mode 100644 2020/8xxx/CVE-2020-8591.json create mode 100644 2020/8xxx/CVE-2020-8592.json create mode 100644 2020/8xxx/CVE-2020-8593.json diff --git a/2019/16xxx/CVE-2019-16451.json b/2019/16xxx/CVE-2019-16451.json index 2893d76226b..bf1c8c697e3 100644 --- a/2019/16xxx/CVE-2019-16451.json +++ b/2019/16xxx/CVE-2019-16451.json @@ -51,6 +51,11 @@ "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-55.html", "refsource": "CONFIRM", "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-55.html" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-145/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-145/" } ] }, diff --git a/2019/20xxx/CVE-2019-20444.json b/2019/20xxx/CVE-2019-20444.json index 4e7a89fcd44..23e3b3d9691 100644 --- a/2019/20xxx/CVE-2019-20444.json +++ b/2019/20xxx/CVE-2019-20444.json @@ -76,6 +76,16 @@ "refsource": "MLIST", "name": "[druid-commits] 20200131 [GitHub] [druid] gianm merged pull request #9300: Fix / suppress netty CVEs CVE-2019-20445 and CVE-2019-20444", "url": "https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-issues] 20200203 [jira] [Created] (ZOOKEEPER-3716) upgrade netty 4.1.42 to address CVE-2019-20444 CVE-2019-20445", + "url": "https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-dev] 20200203 [jira] [Created] (ZOOKEEPER-3716) upgrade netty 4.1.42 to address CVE-2019-20444 CVE-2019-20445", + "url": "https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E" } ] } diff --git a/2019/20xxx/CVE-2019-20445.json b/2019/20xxx/CVE-2019-20445.json index 7db8d8953e8..cd5cb5f3486 100644 --- a/2019/20xxx/CVE-2019-20445.json +++ b/2019/20xxx/CVE-2019-20445.json @@ -76,6 +76,16 @@ "refsource": "MLIST", "name": "[druid-commits] 20200131 [GitHub] [druid] gianm merged pull request #9300: Fix / suppress netty CVEs CVE-2019-20445 and CVE-2019-20444", "url": "https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-issues] 20200203 [jira] [Created] (ZOOKEEPER-3716) upgrade netty 4.1.42 to address CVE-2019-20444 CVE-2019-20445", + "url": "https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-dev] 20200203 [jira] [Created] (ZOOKEEPER-3716) upgrade netty 4.1.42 to address CVE-2019-20444 CVE-2019-20445", + "url": "https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E" } ] } diff --git a/2020/8xxx/CVE-2020-8591.json b/2020/8xxx/CVE-2020-8591.json new file mode 100644 index 00000000000..16cd2f13083 --- /dev/null +++ b/2020/8xxx/CVE-2020-8591.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-8591", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "eG Manager 7.1.2 allows authentication bypass via a com.egurkha.EgLoginServlet?uname=admin&upass=&accessKey=eGm0n1t0r request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://pyaefromucsp.blogspot.com/2020/02/eg-manager-v712improper-access-control_3.html", + "refsource": "MISC", + "name": "https://pyaefromucsp.blogspot.com/2020/02/eg-manager-v712improper-access-control_3.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8592.json b/2020/8xxx/CVE-2020-8592.json new file mode 100644 index 00000000000..7a3afe8600e --- /dev/null +++ b/2020/8xxx/CVE-2020-8592.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-8592", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "eG Manager 7.1.2 allows SQL Injection via the user parameter to com.eg.LoginHelperServlet (aka the Forgot Password feature)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://pyaefromucsp.blogspot.com/2020/02/eg-manager-v712-sql-injection-lead-to_56.html", + "refsource": "MISC", + "name": "https://pyaefromucsp.blogspot.com/2020/02/eg-manager-v712-sql-injection-lead-to_56.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8593.json b/2020/8xxx/CVE-2020-8593.json new file mode 100644 index 00000000000..f46193adc98 --- /dev/null +++ b/2020/8xxx/CVE-2020-8593.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8593", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file