From 54ce2178c9542257e281abca99fcd294f68cbfe0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 19 Aug 2022 20:55:50 +0000 Subject: [PATCH] Auto Generated CVE annotations [Fri Aug 19 20:55:50 UTC 2022] :robot: --- cves/2015/CVE-2015-7377.yaml | 1 + cves/2020/CVE-2020-25864.yaml | 3 +-- cves/2020/CVE-2020-27982.yaml | 1 + cves/2020/CVE-2020-7318.yaml | 2 ++ 4 files changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-7377.yaml b/cves/2015/CVE-2015-7377.yaml index d22e3c0ede..621291ab68 100644 --- a/cves/2015/CVE-2015-7377.yaml +++ b/cves/2015/CVE-2015-7377.yaml @@ -9,6 +9,7 @@ info: - https://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html - https://github.com/GTSolutions/Pie-Register/blob/2.0.19/readme.txt - https://nvd.nist.gov/vuln/detail/CVE-2015-7377 + - http://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html classification: cve-id: CVE-2015-7377 tags: cve,cve2015,wordpress,wp-plugin,xss diff --git a/cves/2020/CVE-2020-25864.yaml b/cves/2020/CVE-2020-25864.yaml index 94c14029a3..ec0a74066b 100644 --- a/cves/2020/CVE-2020-25864.yaml +++ b/cves/2020/CVE-2020-25864.yaml @@ -6,12 +6,11 @@ info: severity: medium description: | HashiCorp Consul and Consul Enterprise up to version 1.9.4 are vulnerable to cross-site scripting via the key-value (KV) raw mode. - remediation: Fixed in 1.9.5, 1.8.10 and 1.7.14. reference: - https://discuss.hashicorp.com/t/hcsec-2021-07-consul-api-kv-endpoint-vulnerable-to-cross-site-scripting/23368 - https://www.hashicorp.com/blog/category/consul - https://nvd.nist.gov/vuln/detail/CVE-2020-25864 - + remediation: Fixed in 1.9.5, 1.8.10 and 1.7.14. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 diff --git a/cves/2020/CVE-2020-27982.yaml b/cves/2020/CVE-2020-27982.yaml index 5c3ed6358a..b39dcf48ca 100644 --- a/cves/2020/CVE-2020-27982.yaml +++ b/cves/2020/CVE-2020-27982.yaml @@ -9,6 +9,7 @@ info: - https://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html - https://cxsecurity.com/issue/WLB-2020100161 - https://nvd.nist.gov/vuln/detail/CVE-2020-27982 + - http://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 diff --git a/cves/2020/CVE-2020-7318.yaml b/cves/2020/CVE-2020-7318.yaml index e0fd2c0339..bd832819f1 100644 --- a/cves/2020/CVE-2020-7318.yaml +++ b/cves/2020/CVE-2020-7318.yaml @@ -10,6 +10,8 @@ info: - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 - https://nvd.nist.gov/vuln/detail/CVE-2020-7318 + reference: + - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 classification: cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N cvss-score: 4.3