"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-09-25 17:01:46 +00:00
parent 3627d1d5fb
commit d4c37fd74b
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
10 changed files with 226 additions and 25 deletions

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-3833-46ae7-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-3833-46ae7-1.html"
},
{
"refsource": "MISC",
"name": "https://github.com/Combodo/iTop/security/advisories/GHSA-88fq-r22m-64q2",
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-88fq-r22m-64q2"
}
]
},

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-3834-591e2-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-3834-591e2-1.html"
},
{
"refsource": "MISC",
"name": "https://github.com/Combodo/iTop/security/advisories/GHSA-8vpf-8vjh-5fcv",
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-8vpf-8vjh-5fcv"
}
]
},

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-3835-e8e8f-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-3835-e8e8f-1.html"
},
{
"refsource": "MISC",
"name": "https://github.com/Combodo/iTop/security/advisories/GHSA-qqrf-j8qv-g247",
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-qqrf-j8qv-g247"
}
]
},

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-3836-47d6c-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-3836-47d6c-1.html"
},
{
"refsource": "MISC",
"name": "https://github.com/Combodo/iTop/security/advisories/GHSA-97cw-cjxc-9x78",
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-97cw-cjxc-9x78"
}
]
},

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-3837-050db-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-3837-050db-1.html"
},
{
"refsource": "MISC",
"name": "https://github.com/Combodo/iTop/security/advisories/GHSA-34rq-vfmf-gg5v",
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-34rq-vfmf-gg5v"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Ericsson RX8200 5.13.3 devices are vulnerable to multiple reflected and stored XSS. An attacker has to inject JavaScript code directly in the \"path\" or \"Services+ID\" parameters and send the URL to a user in order to exploit reflected XSS. In the case of stored XSS, an attacker must modify the \"name\" parameter with the malicious code."
"value": "MediaKind (formerly Ericsson) RX8200 5.13.3 devices are vulnerable to multiple reflected and stored XSS. An attacker has to inject JavaScript code directly in the \"path\" or \"Services+ID\" parameters and send the URL to a user in order to exploit reflected XSS. In the case of stored XSS, an attacker must modify the \"name\" parameter with the malicious code."
}
]
},

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-25137",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-25137",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via the alert_name or alert_message parameter to the /alert_check URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://gist.github.com/mariuszpoplawski/015b605a9bd31f43a8080a105c4312a8",
"url": "https://gist.github.com/mariuszpoplawski/015b605a9bd31f43a8080a105c4312a8"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-25138",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-25138",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via /alert_check/action=delete_alert_checker/alert_test_id= because of pages/alert_check.inc.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://gist.github.com/mariuszpoplawski/bfb6dea73586dbb668d280d412ecb6d8",
"url": "https://gist.github.com/mariuszpoplawski/bfb6dea73586dbb668d280d412ecb6d8"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-25139",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-25139",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via la_id to the /syslog_rules URI for delete_syslog_rule, because of syslog_rules.inc.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://gist.github.com/mariuszpoplawski/1e7526027aec7a89e78950e5e57d007d",
"url": "https://gist.github.com/mariuszpoplawski/1e7526027aec7a89e78950e5e57d007d"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-25140",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-25140",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur in pages/contacts.inc.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.observium.org/changelog/",
"refsource": "MISC",
"name": "https://docs.observium.org/changelog/"
}
]
}