diff --git a/2019/15xxx/CVE-2019-15562.json b/2019/15xxx/CVE-2019-15562.json index de10ff006c2..fe4249d2814 100644 --- a/2019/15xxx/CVE-2019-15562.json +++ b/2019/15xxx/CVE-2019-15562.json @@ -58,9 +58,9 @@ "name": "https://github.com/jinzhu/gorm/releases/tag/v1.9.10" }, { - "url": "https://github.com/jinzhu/gorm/pull/2519", "refsource": "MISC", - "name": "https://github.com/jinzhu/gorm/pull/2519" + "name": "https://github.com/go-gorm/gorm/pull/2519", + "url": "https://github.com/go-gorm/gorm/pull/2519" } ] } diff --git a/2020/15xxx/CVE-2020-15281.json b/2020/15xxx/CVE-2020-15281.json index edfae37a8c7..3e360a5408a 100644 --- a/2020/15xxx/CVE-2020-15281.json +++ b/2020/15xxx/CVE-2020-15281.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15281", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15282.json b/2020/15xxx/CVE-2020-15282.json index 89c70c1a2b0..bde6d8a593f 100644 --- a/2020/15xxx/CVE-2020-15282.json +++ b/2020/15xxx/CVE-2020-15282.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15282", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15285.json b/2020/15xxx/CVE-2020-15285.json index 9dae13c20bc..b3534ab9b5b 100644 --- a/2020/15xxx/CVE-2020-15285.json +++ b/2020/15xxx/CVE-2020-15285.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15285", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15286.json b/2020/15xxx/CVE-2020-15286.json index c32f75196dc..ab8e2e0a3cb 100644 --- a/2020/15xxx/CVE-2020-15286.json +++ b/2020/15xxx/CVE-2020-15286.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15286", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15287.json b/2020/15xxx/CVE-2020-15287.json index 1f1df4e0d00..63e7ff32108 100644 --- a/2020/15xxx/CVE-2020-15287.json +++ b/2020/15xxx/CVE-2020-15287.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15287", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15288.json b/2020/15xxx/CVE-2020-15288.json index 22d43089af3..bbcd630b490 100644 --- a/2020/15xxx/CVE-2020-15288.json +++ b/2020/15xxx/CVE-2020-15288.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15288", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15289.json b/2020/15xxx/CVE-2020-15289.json index 6e7d3b839cd..bb577ddba97 100644 --- a/2020/15xxx/CVE-2020-15289.json +++ b/2020/15xxx/CVE-2020-15289.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15289", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15290.json b/2020/15xxx/CVE-2020-15290.json index b0cd2f857db..9788d225fdd 100644 --- a/2020/15xxx/CVE-2020-15290.json +++ b/2020/15xxx/CVE-2020-15290.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15290", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15291.json b/2020/15xxx/CVE-2020-15291.json index 68f53210b09..808af8ad03a 100644 --- a/2020/15xxx/CVE-2020-15291.json +++ b/2020/15xxx/CVE-2020-15291.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15291", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15295.json b/2020/15xxx/CVE-2020-15295.json index 81d5bd9c03c..42adc2806b7 100644 --- a/2020/15xxx/CVE-2020-15295.json +++ b/2020/15xxx/CVE-2020-15295.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15295", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15296.json b/2020/15xxx/CVE-2020-15296.json index b06b60e0bed..b459a0f734e 100644 --- a/2020/15xxx/CVE-2020-15296.json +++ b/2020/15xxx/CVE-2020-15296.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15296", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15298.json b/2020/15xxx/CVE-2020-15298.json index 44483a312bd..c81f33df6b7 100644 --- a/2020/15xxx/CVE-2020-15298.json +++ b/2020/15xxx/CVE-2020-15298.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15298", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15728.json b/2020/15xxx/CVE-2020-15728.json index 1223280dd15..9113218e842 100644 --- a/2020/15xxx/CVE-2020-15728.json +++ b/2020/15xxx/CVE-2020-15728.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15728", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15736.json b/2020/15xxx/CVE-2020-15736.json index 7bcc0c162e3..e6d4d2eddc6 100644 --- a/2020/15xxx/CVE-2020-15736.json +++ b/2020/15xxx/CVE-2020-15736.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15736", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15737.json b/2020/15xxx/CVE-2020-15737.json index 9c2cf7a7025..b32e5ffdcf1 100644 --- a/2020/15xxx/CVE-2020-15737.json +++ b/2020/15xxx/CVE-2020-15737.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15737", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15738.json b/2020/15xxx/CVE-2020-15738.json index e7630186e19..c01fe11894b 100644 --- a/2020/15xxx/CVE-2020-15738.json +++ b/2020/15xxx/CVE-2020-15738.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15738", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15740.json b/2020/15xxx/CVE-2020-15740.json index 623a4d33303..8908455f015 100644 --- a/2020/15xxx/CVE-2020-15740.json +++ b/2020/15xxx/CVE-2020-15740.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15740", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15741.json b/2020/15xxx/CVE-2020-15741.json index 4dfe0e5d59d..72ca71af103 100644 --- a/2020/15xxx/CVE-2020-15741.json +++ b/2020/15xxx/CVE-2020-15741.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15741", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15743.json b/2020/15xxx/CVE-2020-15743.json index 2c1714c9dcc..ccf065094ac 100644 --- a/2020/15xxx/CVE-2020-15743.json +++ b/2020/15xxx/CVE-2020-15743.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15743", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15745.json b/2020/15xxx/CVE-2020-15745.json index d160de467ab..7b8d41256a4 100644 --- a/2020/15xxx/CVE-2020-15745.json +++ b/2020/15xxx/CVE-2020-15745.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15745", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15746.json b/2020/15xxx/CVE-2020-15746.json index 793c9b9d734..f972f8a3e65 100644 --- a/2020/15xxx/CVE-2020-15746.json +++ b/2020/15xxx/CVE-2020-15746.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15746", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15747.json b/2020/15xxx/CVE-2020-15747.json index d601113b06b..5753a28b9a1 100644 --- a/2020/15xxx/CVE-2020-15747.json +++ b/2020/15xxx/CVE-2020-15747.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15747", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15748.json b/2020/15xxx/CVE-2020-15748.json index e309efb199a..8412ec10687 100644 --- a/2020/15xxx/CVE-2020-15748.json +++ b/2020/15xxx/CVE-2020-15748.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15748", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15749.json b/2020/15xxx/CVE-2020-15749.json index 50374e98cb7..d3cbed01cb3 100644 --- a/2020/15xxx/CVE-2020-15749.json +++ b/2020/15xxx/CVE-2020-15749.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15749", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15750.json b/2020/15xxx/CVE-2020-15750.json index 05f4d520dc9..08e272309ff 100644 --- a/2020/15xxx/CVE-2020-15750.json +++ b/2020/15xxx/CVE-2020-15750.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15750", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15751.json b/2020/15xxx/CVE-2020-15751.json index 81d1151e150..8fb1f52187d 100644 --- a/2020/15xxx/CVE-2020-15751.json +++ b/2020/15xxx/CVE-2020-15751.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15751", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15752.json b/2020/15xxx/CVE-2020-15752.json index 8104ed8e7e7..22c04f0e2c8 100644 --- a/2020/15xxx/CVE-2020-15752.json +++ b/2020/15xxx/CVE-2020-15752.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15752", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15753.json b/2020/15xxx/CVE-2020-15753.json index 83ed29577cc..53b1a0b51bc 100644 --- a/2020/15xxx/CVE-2020-15753.json +++ b/2020/15xxx/CVE-2020-15753.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15753", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15754.json b/2020/15xxx/CVE-2020-15754.json index 2ed3e1c2cc8..f9f501a3283 100644 --- a/2020/15xxx/CVE-2020-15754.json +++ b/2020/15xxx/CVE-2020-15754.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15754", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15755.json b/2020/15xxx/CVE-2020-15755.json index e4f968237a1..c813b18cb51 100644 --- a/2020/15xxx/CVE-2020-15755.json +++ b/2020/15xxx/CVE-2020-15755.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15755", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15756.json b/2020/15xxx/CVE-2020-15756.json index 6a905bdcf0f..66e65a306bf 100644 --- a/2020/15xxx/CVE-2020-15756.json +++ b/2020/15xxx/CVE-2020-15756.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15756", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15757.json b/2020/15xxx/CVE-2020-15757.json index 7ef9bac188a..5d11f54becf 100644 --- a/2020/15xxx/CVE-2020-15757.json +++ b/2020/15xxx/CVE-2020-15757.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15757", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15758.json b/2020/15xxx/CVE-2020-15758.json index f8ad1c5f533..22aeb3ec01e 100644 --- a/2020/15xxx/CVE-2020-15758.json +++ b/2020/15xxx/CVE-2020-15758.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15758", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15759.json b/2020/15xxx/CVE-2020-15759.json index 4e25c5d9676..8646c5f29b3 100644 --- a/2020/15xxx/CVE-2020-15759.json +++ b/2020/15xxx/CVE-2020-15759.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15759", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15760.json b/2020/15xxx/CVE-2020-15760.json index 8a969f003fb..b9c7bd5b60b 100644 --- a/2020/15xxx/CVE-2020-15760.json +++ b/2020/15xxx/CVE-2020-15760.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15760", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15761.json b/2020/15xxx/CVE-2020-15761.json index fee7e5e45dc..e6980108a2a 100644 --- a/2020/15xxx/CVE-2020-15761.json +++ b/2020/15xxx/CVE-2020-15761.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15761", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15762.json b/2020/15xxx/CVE-2020-15762.json index cdced607097..c8a9126ea06 100644 --- a/2020/15xxx/CVE-2020-15762.json +++ b/2020/15xxx/CVE-2020-15762.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15762", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15763.json b/2020/15xxx/CVE-2020-15763.json index 0177709ba5f..bed9d77d38b 100644 --- a/2020/15xxx/CVE-2020-15763.json +++ b/2020/15xxx/CVE-2020-15763.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15763", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15764.json b/2020/15xxx/CVE-2020-15764.json index 0d476072817..16b19ac4762 100644 --- a/2020/15xxx/CVE-2020-15764.json +++ b/2020/15xxx/CVE-2020-15764.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15764", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15765.json b/2020/15xxx/CVE-2020-15765.json index 88dfc798be8..832b81ee99e 100644 --- a/2020/15xxx/CVE-2020-15765.json +++ b/2020/15xxx/CVE-2020-15765.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15765", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15766.json b/2020/15xxx/CVE-2020-15766.json index aebd8b9fe1d..315c456b82d 100644 --- a/2020/15xxx/CVE-2020-15766.json +++ b/2020/15xxx/CVE-2020-15766.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15766", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/28xxx/CVE-2020-28873.json b/2020/28xxx/CVE-2020-28873.json index 07a3135657e..646efb07f93 100644 --- a/2020/28xxx/CVE-2020-28873.json +++ b/2020/28xxx/CVE-2020-28873.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28873", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28873", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fluxbb 1.5.11 is affected by a denial of service (DoS) vulnerability by sending an extremely long password via the user login form. When a long password is sent, the password hashing process will result in CPU and memory exhaustion on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://fluxbb.com", + "refsource": "MISC", + "name": "http://fluxbb.com" + }, + { + "refsource": "MISC", + "name": "https://www.acunetix.com/vulnerabilities/web/long-password-denial-of-service/#:~:text=By%20sending%20a%20very%20long,a%20vulnerable%20password%20hashing%20implementation", + "url": "https://www.acunetix.com/vulnerabilities/web/long-password-denial-of-service/#:~:text=By%20sending%20a%20very%20long,a%20vulnerable%20password%20hashing%20implementation" } ] } diff --git a/2020/8xxx/CVE-2020-8106.json b/2020/8xxx/CVE-2020-8106.json index cbf3448dc84..393a139df28 100644 --- a/2020/8xxx/CVE-2020-8106.json +++ b/2020/8xxx/CVE-2020-8106.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8106", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/8xxx/CVE-2020-8111.json b/2020/8xxx/CVE-2020-8111.json index f152e166292..5c09539437c 100644 --- a/2020/8xxx/CVE-2020-8111.json +++ b/2020/8xxx/CVE-2020-8111.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8111", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2021/27xxx/CVE-2021-27291.json b/2021/27xxx/CVE-2021-27291.json index b4aa0e69c86..14d0d0e9ea5 100644 --- a/2021/27xxx/CVE-2021-27291.json +++ b/2021/27xxx/CVE-2021-27291.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27291", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27291", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce", + "url": "https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce" + }, + { + "refsource": "MISC", + "name": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14", + "url": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14" } ] } diff --git a/2021/27xxx/CVE-2021-27292.json b/2021/27xxx/CVE-2021-27292.json index dc2c840f829..c7d34245111 100644 --- a/2021/27xxx/CVE-2021-27292.json +++ b/2021/27xxx/CVE-2021-27292.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27292", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27292", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14", + "url": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76", + "url": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76" } ] }