diff --git a/2019/12xxx/CVE-2019-12419.json b/2019/12xxx/CVE-2019-12419.json index a22644dc05e..470ef7ca423 100644 --- a/2019/12xxx/CVE-2019-12419.json +++ b/2019/12xxx/CVE-2019-12419.json @@ -83,6 +83,11 @@ "refsource": "MLIST", "name": "[cxf-dev] 20201030 CVE-2019-12419", "url": "https://lists.apache.org/thread.html/ree5fc719e330f82ae38a2b0050c91f18ed5b878312dc0b9e0b9815be@%3Cdev.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-dev] 20201102 Re: CVE-2019-12419", + "url": "https://lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0263edf62becd5e20fc96251cff59f6@%3Cdev.cxf.apache.org%3E" } ] }, diff --git a/2019/19xxx/CVE-2019-19917.json b/2019/19xxx/CVE-2019-19917.json index 66605d0c15f..3873a084726 100644 --- a/2019/19xxx/CVE-2019-19917.json +++ b/2019/19xxx/CVE-2019-19917.json @@ -81,6 +81,16 @@ "refsource": "FEDORA", "name": "FEDORA-2020-81c80ff1ed", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1813", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1812", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" } ] } diff --git a/2019/19xxx/CVE-2019-19918.json b/2019/19xxx/CVE-2019-19918.json index 8ea9cc7a5fb..80e28a1834e 100644 --- a/2019/19xxx/CVE-2019-19918.json +++ b/2019/19xxx/CVE-2019-19918.json @@ -81,6 +81,16 @@ "refsource": "FEDORA", "name": "FEDORA-2020-81c80ff1ed", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1813", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1812", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" } ] } diff --git a/2020/14xxx/CVE-2020-14323.json b/2020/14xxx/CVE-2020-14323.json index 945c4ab300c..a5664f887f9 100644 --- a/2020/14xxx/CVE-2020-14323.json +++ b/2020/14xxx/CVE-2020-14323.json @@ -58,11 +58,6 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1811", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" - }, - { - "refsource": "SUSE", - "name": "openSUSE-SU-2020:1819", - "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" } ] }, diff --git a/2020/15xxx/CVE-2020-15229.json b/2020/15xxx/CVE-2020-15229.json index 44276b2ffad..e7356211754 100644 --- a/2020/15xxx/CVE-2020-15229.json +++ b/2020/15xxx/CVE-2020-15229.json @@ -98,6 +98,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1770", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1814", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html" } ] }, diff --git a/2020/23xxx/CVE-2020-23868.json b/2020/23xxx/CVE-2020-23868.json index 653fda066e3..ff91e94e8b0 100644 --- a/2020/23xxx/CVE-2020-23868.json +++ b/2020/23xxx/CVE-2020-23868.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23868", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23868", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NeDi 1.9C allows inc/rt-popup.php d XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/harsh-bothra/f4285d20a7718d2e1934c042b04d9fac", + "url": "https://gist.github.com/harsh-bothra/f4285d20a7718d2e1934c042b04d9fac" } ] } diff --git a/2020/23xxx/CVE-2020-23989.json b/2020/23xxx/CVE-2020-23989.json index 9046cd587b2..352cd47dbcd 100644 --- a/2020/23xxx/CVE-2020-23989.json +++ b/2020/23xxx/CVE-2020-23989.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23989", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23989", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NeDi 1.9C allows pwsec.php oid XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/harsh-bothra/d8c86b8279b23ff6d371f832ba0a5b6b", + "url": "https://gist.github.com/harsh-bothra/d8c86b8279b23ff6d371f832ba0a5b6b" } ] } diff --git a/2020/24xxx/CVE-2020-24848.json b/2020/24xxx/CVE-2020-24848.json index af45d71412e..9373f2c3b41 100644 --- a/2020/24xxx/CVE-2020-24848.json +++ b/2020/24xxx/CVE-2020-24848.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/xtr4nge/FruityWifi/issues/278", "url": "https://github.com/xtr4nge/FruityWifi/issues/278" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/harsh-bothra/5be73cfd53f1c5bea307c702ae83ff42", + "url": "https://gist.github.com/harsh-bothra/5be73cfd53f1c5bea307c702ae83ff42" } ] } diff --git a/2020/28xxx/CVE-2020-28046.json b/2020/28xxx/CVE-2020-28046.json index 60dd8387872..cd05d9f31a1 100644 --- a/2020/28xxx/CVE-2020-28046.json +++ b/2020/28xxx/CVE-2020-28046.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch, a related issue to CVE-2019-11360." + "value": "An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch." } ] }, diff --git a/2020/28xxx/CVE-2020-28195.json b/2020/28xxx/CVE-2020-28195.json new file mode 100644 index 00000000000..96b1afacf21 --- /dev/null +++ b/2020/28xxx/CVE-2020-28195.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28195", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file