From eae5c3c67d706bd5fb0a27ec5c4bcb66a6da6088 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 23 Sep 2021 20:01:02 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15166.json | 40 ++++++++++++------------ 2020/19xxx/CVE-2020-19949.json | 56 ++++++++++++++++++++++++++++++---- 2020/19xxx/CVE-2020-19950.json | 56 ++++++++++++++++++++++++++++++---- 2020/19xxx/CVE-2020-19951.json | 56 ++++++++++++++++++++++++++++++---- 2020/8xxx/CVE-2020-8037.json | 14 ++++----- 5 files changed, 177 insertions(+), 45 deletions(-) diff --git a/2019/15xxx/CVE-2019-15166.json b/2019/15xxx/CVE-2019-15166.json index 28bd43af354..2cf6d4cff04 100644 --- a/2019/15xxx/CVE-2019-15166.json +++ b/2019/15xxx/CVE-2019-15166.json @@ -72,16 +72,6 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", - "refsource": "MISC", - "url": "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES" - }, - { - "name": "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4", - "refsource": "CONFIRM", - "url": "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4" - }, { "name": "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", "refsource": "MLIST", @@ -122,11 +112,6 @@ "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/" }, - { - "name": "https://support.apple.com/kb/HT210788", - "refsource": "CONFIRM", - "url": "https://support.apple.com/kb/HT210788" - }, { "name": "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", "refsource": "BUGTRAQ", @@ -137,11 +122,6 @@ "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Dec/26" }, - { - "name": "https://security.netapp.com/advisory/ntap-20200120-0001/", - "refsource": "CONFIRM", - "url": "https://security.netapp.com/advisory/ntap-20200120-0001/" - }, { "name": "USN-4252-2", "refsource": "UBUNTU", @@ -151,6 +131,26 @@ "name": "USN-4252-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4252-1/" + }, + { + "name": "https://support.apple.com/kb/HT210788", + "refsource": "CONFIRM", + "url": "https://support.apple.com/kb/HT210788" + }, + { + "name": "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", + "refsource": "MISC", + "url": "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES" + }, + { + "name": "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4", + "refsource": "CONFIRM", + "url": "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4" + }, + { + "name": "https://security.netapp.com/advisory/ntap-20200120-0001/", + "refsource": "CONFIRM", + "url": "https://security.netapp.com/advisory/ntap-20200120-0001/" } ] }, diff --git a/2020/19xxx/CVE-2020-19949.json b/2020/19xxx/CVE-2020-19949.json index 4726037f2fb..edeccf17be8 100644 --- a/2020/19xxx/CVE-2020-19949.json +++ b/2020/19xxx/CVE-2020-19949.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-19949", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-19949", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the /link/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yzmcms/yzmcms/issues/21", + "refsource": "MISC", + "name": "https://github.com/yzmcms/yzmcms/issues/21" } ] } diff --git a/2020/19xxx/CVE-2020-19950.json b/2020/19xxx/CVE-2020-19950.json index 20041477b82..7ef740a8aab 100644 --- a/2020/19xxx/CVE-2020-19950.json +++ b/2020/19xxx/CVE-2020-19950.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-19950", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-19950", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the /banner/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yzmcms/yzmcms/issues/22", + "refsource": "MISC", + "name": "https://github.com/yzmcms/yzmcms/issues/22" } ] } diff --git a/2020/19xxx/CVE-2020-19951.json b/2020/19xxx/CVE-2020-19951.json index bcc2f58e298..cbbda5da075 100644 --- a/2020/19xxx/CVE-2020-19951.json +++ b/2020/19xxx/CVE-2020-19951.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-19951", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-19951", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) in /controller/pay.class.php of YzmCMS v5.5 allows attackers to access sensitive components of the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yzmcms/yzmcms/issues/43", + "refsource": "MISC", + "name": "https://github.com/yzmcms/yzmcms/issues/43" } ] } diff --git a/2020/8xxx/CVE-2020-8037.json b/2020/8xxx/CVE-2020-8037.json index b80f25f5cfa..025f5ed60a2 100644 --- a/2020/8xxx/CVE-2020-8037.json +++ b/2020/8xxx/CVE-2020-8037.json @@ -32,7 +32,7 @@ ] } }, - "credit" : [ + "credit": [ { "lang": "eng", "value": "Hardik Shah" @@ -80,6 +80,11 @@ "name": "FEDORA-2020-c5e78886d6", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2MX34MJIUJQGL6CMEPLTKFOOOC3CJ4Z/" }, + { + "refsource": "FULLDISC", + "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/Apr/51" + }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212325", @@ -94,12 +99,7 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212327", "url": "https://support.apple.com/kb/HT212327" - }, - { - "refsource": "FULLDISC", - "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", - "url": "http://seclists.org/fulldisclosure/2021/Apr/51" } ] } -} +} \ No newline at end of file