From d55c0494f74c9d320aaab95eadf4643a1b0d6b66 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 16 May 2020 20:01:15 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/17xxx/CVE-2019-17571.json | 5 +++ 2020/12xxx/CVE-2020-12783.json | 5 +++ 2020/13xxx/CVE-2020-13118.json | 62 ++++++++++++++++++++++++++++++++++ 2020/13xxx/CVE-2020-13119.json | 18 ++++++++++ 2020/13xxx/CVE-2020-13120.json | 18 ++++++++++ 2020/13xxx/CVE-2020-13121.json | 62 ++++++++++++++++++++++++++++++++++ 6 files changed, 170 insertions(+) create mode 100644 2020/13xxx/CVE-2020-13118.json create mode 100644 2020/13xxx/CVE-2020-13119.json create mode 100644 2020/13xxx/CVE-2020-13120.json create mode 100644 2020/13xxx/CVE-2020-13121.json diff --git a/2019/17xxx/CVE-2019-17571.json b/2019/17xxx/CVE-2019-17571.json index 986872a0899..28e2cf6a352 100644 --- a/2019/17xxx/CVE-2019-17571.json +++ b/2019/17xxx/CVE-2019-17571.json @@ -328,6 +328,11 @@ "refsource": "MLIST", "name": "[kafka-jira] 20200514 [GitHub] [kafka] jeffhuang26 commented on pull request #7898: KAFKA-9366: please consider upgrade log4j to log4j2 due to critical security problem CVE-2019-17571", "url": "https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4686", + "url": "https://www.debian.org/security/2020/dsa-4686" } ] }, diff --git a/2020/12xxx/CVE-2020-12783.json b/2020/12xxx/CVE-2020-12783.json index d05db5bdab1..4b037b25a93 100644 --- a/2020/12xxx/CVE-2020-12783.json +++ b/2020/12xxx/CVE-2020-12783.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0", "url": "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4687", + "url": "https://www.debian.org/security/2020/dsa-4687" } ] } diff --git a/2020/13xxx/CVE-2020-13118.json b/2020/13xxx/CVE-2020-13118.json new file mode 100644 index 00000000000..534a313c5d2 --- /dev/null +++ b/2020/13xxx/CVE-2020-13118.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13118", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Mikrotik-Router-Monitoring-System through 2018-10-22. SQL Injection exists in check_community.php via the parameter community." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4", + "refsource": "MISC", + "name": "https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13119.json b/2020/13xxx/CVE-2020-13119.json new file mode 100644 index 00000000000..c272ace5d7a --- /dev/null +++ b/2020/13xxx/CVE-2020-13119.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13119", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13120.json b/2020/13xxx/CVE-2020-13120.json new file mode 100644 index 00000000000..bf2f4cc9d9c --- /dev/null +++ b/2020/13xxx/CVE-2020-13120.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13120", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13121.json b/2020/13xxx/CVE-2020-13121.json new file mode 100644 index 00000000000..3a92db66c1d --- /dev/null +++ b/2020/13xxx/CVE-2020-13121.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13121", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Submitty through 20.04.01 has an open redirect via authentication/login?old= during an invalid login attempt." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Submitty/Submitty/issues/5265", + "refsource": "MISC", + "name": "https://github.com/Submitty/Submitty/issues/5265" + } + ] + } +} \ No newline at end of file