From d488f3d609ad024f2622a054d5957df530478ffa Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 4 Feb 2020 19:01:09 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10784.json | 50 ++++++++++++++++++++++++++++++++-- 2019/19xxx/CVE-2019-19232.json | 5 ++++ 2020/8xxx/CVE-2020-8611.json | 18 ++++++++++++ 2020/8xxx/CVE-2020-8612.json | 18 ++++++++++++ 2020/8xxx/CVE-2020-8613.json | 18 ++++++++++++ 2020/8xxx/CVE-2020-8614.json | 18 ++++++++++++ 2020/8xxx/CVE-2020-8615.json | 18 ++++++++++++ 7 files changed, 142 insertions(+), 3 deletions(-) create mode 100644 2020/8xxx/CVE-2020-8611.json create mode 100644 2020/8xxx/CVE-2020-8612.json create mode 100644 2020/8xxx/CVE-2020-8613.json create mode 100644 2020/8xxx/CVE-2020-8614.json create mode 100644 2020/8xxx/CVE-2020-8615.json diff --git a/2019/10xxx/CVE-2019-10784.json b/2019/10xxx/CVE-2019-10784.json index 73a8269b5c5..ef6659a7aa2 100644 --- a/2019/10xxx/CVE-2019-10784.json +++ b/2019/10xxx/CVE-2019-10784.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10784", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "report@snyk.io", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "phppgadmin", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885", + "url": "https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, \"database.php\" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server." } ] } diff --git a/2019/19xxx/CVE-2019-19232.json b/2019/19xxx/CVE-2019-19232.json index 654a4effe54..75a70796bcb 100644 --- a/2019/19xxx/CVE-2019-19232.json +++ b/2019/19xxx/CVE-2019-19232.json @@ -101,6 +101,11 @@ "refsource": "CONFIRM", "name": "https://access.redhat.com/security/cve/cve-2019-19232", "url": "https://access.redhat.com/security/cve/cve-2019-19232" + }, + { + "refsource": "MISC", + "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs76870", + "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs76870" } ] } diff --git a/2020/8xxx/CVE-2020-8611.json b/2020/8xxx/CVE-2020-8611.json new file mode 100644 index 00000000000..b0477ddf69b --- /dev/null +++ b/2020/8xxx/CVE-2020-8611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8612.json b/2020/8xxx/CVE-2020-8612.json new file mode 100644 index 00000000000..05ac1769ab6 --- /dev/null +++ b/2020/8xxx/CVE-2020-8612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8613.json b/2020/8xxx/CVE-2020-8613.json new file mode 100644 index 00000000000..6a107fb389a --- /dev/null +++ b/2020/8xxx/CVE-2020-8613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8614.json b/2020/8xxx/CVE-2020-8614.json new file mode 100644 index 00000000000..a55a8b49129 --- /dev/null +++ b/2020/8xxx/CVE-2020-8614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8615.json b/2020/8xxx/CVE-2020-8615.json new file mode 100644 index 00000000000..0fbe32e603e --- /dev/null +++ b/2020/8xxx/CVE-2020-8615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file