diff --git a/2011/3xxx/CVE-2011-3611.json b/2011/3xxx/CVE-2011-3611.json index 918d926b2bd..1cb41f2f681 100644 --- a/2011/3xxx/CVE-2011-3611.json +++ b/2011/3xxx/CVE-2011-3611.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3611", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "UseBB", + "version": { + "version_data": [ + { + "version_value": "before 1.0.12" + } + ] + } + } + ] + }, + "vendor_name": "UseBB" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A File Inclusion vulnerability exists in act parameter to admin.php in UseBB before 1.0.12." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Local File Inclusion" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.openwall.com/lists/oss-security/2011/10/10/4", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2011/10/10/4" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html", + "url": "https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html" + }, + { + "refsource": "MISC", + "name": "https://www.immuniweb.com/advisory/HTB22913", + "url": "https://www.immuniweb.com/advisory/HTB22913" } ] } diff --git a/2018/13xxx/CVE-2018-13379.json b/2018/13xxx/CVE-2018-13379.json index 2a05c9186c2..4c824af5f7c 100644 --- a/2018/13xxx/CVE-2018-13379.json +++ b/2018/13xxx/CVE-2018-13379.json @@ -83,7 +83,7 @@ "description_data": [ { "lang": "eng", - "value": "An Improper Limitation of a Pathname to a Restricted Directory (\"Path Traversal\") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests." + "value": "An Improper Limitation of a Pathname to a Restricted Directory (\"Path Traversal\") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests." } ] } diff --git a/2019/19xxx/CVE-2019-19592.json b/2019/19xxx/CVE-2019-19592.json index 5f2ad3c0ca7..cb5243b9af3 100644 --- a/2019/19xxx/CVE-2019-19592.json +++ b/2019/19xxx/CVE-2019-19592.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Jama Connect 8.44.0 has XSS via the \"Import File and Destination\" tab on the \"Data import wizard\" screen." + "value": "Jama Connect 8.44.0 is vulnerable to stored Cross-Site Scripting" } ] }, diff --git a/2019/6xxx/CVE-2019-6146.json b/2019/6xxx/CVE-2019-6146.json index 62f1bdc14fa..d409d27223f 100644 --- a/2019/6xxx/CVE-2019-6146.json +++ b/2019/6xxx/CVE-2019-6146.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6146", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6146", + "ASSIGNER": "psirt@forcepoint.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Forcepoint Web Security", + "version": { + "version_data": [ + { + "version_value": "8.5, 8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.forcepoint.com/KBArticle?id=000017702", + "url": "https://support.forcepoint.com/KBArticle?id=000017702" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It has been reported that cross-site scripting (XSS) is possible in Forcepoint Web Security, version 8.x, via host header injection. CVSSv3.0: 5.3 (Medium) (/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)" } ] } diff --git a/2019/6xxx/CVE-2019-6695.json b/2019/6xxx/CVE-2019-6695.json index 45e9d53892d..9e5cc15c8b8 100644 --- a/2019/6xxx/CVE-2019-6695.json +++ b/2019/6xxx/CVE-2019-6695.json @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods." + "value": "Lack of root file system integrity checking in Fortinet FortiManager VM application images of 6.2.0, 6.0.6 and below may allow an attacker to implant third-party programs by recreating the image through specific methods." } ] } diff --git a/2020/7xxx/CVE-2020-7109.json b/2020/7xxx/CVE-2020-7109.json index d280ff03a4b..4cfa1dc0cab 100644 --- a/2020/7xxx/CVE-2020-7109.json +++ b/2020/7xxx/CVE-2020-7109.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-7109", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-7109", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Elementor Page Builder plugin before 2.8.4 for WordPress does not sanitize data during creation of a new template." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/elementor/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/elementor/#developers" } ] } diff --git a/2020/7xxx/CVE-2020-7903.json b/2020/7xxx/CVE-2020-7903.json new file mode 100644 index 00000000000..afc73b62d4c --- /dev/null +++ b/2020/7xxx/CVE-2020-7903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file