diff --git a/2019/17xxx/CVE-2019-17563.json b/2019/17xxx/CVE-2019-17563.json index e28d13acd8d..2938591fb61 100644 --- a/2019/17xxx/CVE-2019-17563.json +++ b/2019/17xxx/CVE-2019-17563.json @@ -129,6 +129,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html" + }, + { + "refsource": "MLIST", + "name": "[cxf-issues] 20200618 [jira] [Created] (FEDIZ-249) Relying party rejects a valid security token and redirects back to ADFS when using Fediz 1.4.6 with Tomcat 8.5.56", + "url": "https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E" } ] }, diff --git a/2020/10xxx/CVE-2020-10782.json b/2020/10xxx/CVE-2020-10782.json index 6917fd6f346..f64a6450334 100644 --- a/2020/10xxx/CVE-2020-10782.json +++ b/2020/10xxx/CVE-2020-10782.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-10782", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -76,4 +77,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14419.json b/2020/14xxx/CVE-2020-14419.json new file mode 100644 index 00000000000..f4fbc8a4212 --- /dev/null +++ b/2020/14xxx/CVE-2020-14419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14420.json b/2020/14xxx/CVE-2020-14420.json new file mode 100644 index 00000000000..53fbe96ac1c --- /dev/null +++ b/2020/14xxx/CVE-2020-14420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14421.json b/2020/14xxx/CVE-2020-14421.json new file mode 100644 index 00000000000..0934e4b2813 --- /dev/null +++ b/2020/14xxx/CVE-2020-14421.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-14421", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary commands via the Script Content box on the Add Cron Job screen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jenaye/aapanel", + "refsource": "MISC", + "name": "https://github.com/jenaye/aapanel" + }, + { + "url": "https://forum.aapanel.com", + "refsource": "MISC", + "name": "https://forum.aapanel.com" + } + ] + } +} \ No newline at end of file diff --git a/2020/1xxx/CVE-2020-1825.json b/2020/1xxx/CVE-2020-1825.json index 760ef4754e0..d262717f2ae 100644 --- a/2020/1xxx/CVE-2020-1825.json +++ b/2020/1xxx/CVE-2020-1825.json @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "DoS" } ] } @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "Huawei FusionAccess products with versions earlier than 6.5.1.SPC002 has a Denial of Service (DoS) vulnerability. Due to insufficient verification on specific input, attackers can exploit this vulnerability by sending constructed messages to the affected device through other device on the same network. Successful exploit could cause affected devices to be abnormal." + "value": "FusionAccess with versions earlier than 6.5.1.SPC002 have a Denial of Service (DoS) vulnerability. Due to insufficient verification on specific input, attackers can exploit this vulnerability by sending constructed messages to the affected device through another device on the same network. Successful exploit could cause affected devices to be abnormal." } ] }