diff --git a/2019/7xxx/CVE-2019-7357.json b/2019/7xxx/CVE-2019-7357.json index 8ef22619c61..9136b4b1b1f 100644 --- a/2019/7xxx/CVE-2019-7357.json +++ b/2019/7xxx/CVE-2019-7357.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7357", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Subrion CMS 4.2.1 has CSRF in panel/modules/plugins/. The attacker can remotely activate/deactivate the plugins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/intelliants/subrion/commits/develop", + "refsource": "MISC", + "name": "https://github.com/intelliants/subrion/commits/develop" + }, + { + "refsource": "MISC", + "name": "https://github.com/ngpentest007/CVE-2019-7357/blob/main/Subrion_4.2.1%20-%20CVE-2019-7357.pdf", + "url": "https://github.com/ngpentest007/CVE-2019-7357/blob/main/Subrion_4.2.1%20-%20CVE-2019-7357.pdf" } ] } diff --git a/2020/23xxx/CVE-2020-23968.json b/2020/23xxx/CVE-2020-23968.json index 5eea4b179d1..7b1a24dfbbc 100644 --- a/2020/23xxx/CVE-2020-23968.json +++ b/2020/23xxx/CVE-2020-23968.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23968", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23968", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Ilex International Sign&go Workstation Security Suite 7.1 allows elevation of privileges via a symlink attack on ProgramData\\Ilex\\S&G\\Logs\\000-sngWSService1.log." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://ilex.com", + "refsource": "MISC", + "name": "http://ilex.com" + }, + { + "url": "http://signgo.com", + "refsource": "MISC", + "name": "http://signgo.com" + }, + { + "refsource": "MISC", + "name": "https://ricardojba.github.io/CVE-Pending-ILEX-SignGo-EoP/", + "url": "https://ricardojba.github.io/CVE-Pending-ILEX-SignGo-EoP/" } ] } diff --git a/2020/28xxx/CVE-2020-28401.json b/2020/28xxx/CVE-2020-28401.json new file mode 100644 index 00000000000..b9a60e7b5aa --- /dev/null +++ b/2020/28xxx/CVE-2020-28401.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28401", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28402.json b/2020/28xxx/CVE-2020-28402.json new file mode 100644 index 00000000000..509e20c08af --- /dev/null +++ b/2020/28xxx/CVE-2020-28402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28403.json b/2020/28xxx/CVE-2020-28403.json new file mode 100644 index 00000000000..afcd17f2709 --- /dev/null +++ b/2020/28xxx/CVE-2020-28403.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28403", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28404.json b/2020/28xxx/CVE-2020-28404.json new file mode 100644 index 00000000000..515692a2d9f --- /dev/null +++ b/2020/28xxx/CVE-2020-28404.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28404", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28405.json b/2020/28xxx/CVE-2020-28405.json new file mode 100644 index 00000000000..ea9c9a82c47 --- /dev/null +++ b/2020/28xxx/CVE-2020-28405.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28405", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28406.json b/2020/28xxx/CVE-2020-28406.json new file mode 100644 index 00000000000..7a29d688a52 --- /dev/null +++ b/2020/28xxx/CVE-2020-28406.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28406", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28407.json b/2020/28xxx/CVE-2020-28407.json new file mode 100644 index 00000000000..8f08c897d74 --- /dev/null +++ b/2020/28xxx/CVE-2020-28407.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28407", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5517.json b/2020/5xxx/CVE-2020-5517.json index 613e884aa15..485dadf2ae8 100644 --- a/2020/5xxx/CVE-2020-5517.json +++ b/2020/5xxx/CVE-2020-5517.json @@ -56,6 +56,16 @@ "refsource": "MISC", "name": "https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4", "url": "https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4" + }, + { + "refsource": "CONFIRM", + "name": "https://www.blueonyx.it/news/278/15/5209R5210R-YUM-Updates/", + "url": "https://www.blueonyx.it/news/278/15/5209R5210R-YUM-Updates/" + }, + { + "refsource": "CONFIRM", + "name": "https://devel.blueonyx.it/trac/changeset/4034/", + "url": "https://devel.blueonyx.it/trac/changeset/4034/" } ] }