From 6cc3f88a5d2c83dba808a8c9f0a101c5c52f68af Mon Sep 17 00:00:00 2001 From: team-projectdiscovery <8293321+bauthard@users.noreply.github.com> Date: Sat, 2 Jan 2021 10:26:15 +0530 Subject: [PATCH] misc changes --- cves/2020/CVE-2020-0618.yaml | 2 +- cves/2020/CVE-2020-10148.yaml | 2 +- cves/2020/CVE-2020-10199.yaml | 2 +- cves/2020/CVE-2020-10204.yaml | 2 +- cves/2020/CVE-2020-11034.yaml | 2 +- cves/2020/CVE-2020-1147.yaml | 2 +- cves/2020/CVE-2020-11738.yaml | 2 +- cves/2020/CVE-2020-12116.yaml | 2 +- cves/2020/CVE-2020-12720.yaml | 2 +- cves/2020/CVE-2020-13167.yaml | 2 +- cves/2020/CVE-2020-13942.yaml | 2 +- cves/2020/CVE-2020-14179.yaml | 2 +- cves/2020/CVE-2020-14181.yaml | 2 +- cves/2020/CVE-2020-14882.yaml | 2 +- cves/2020/CVE-2020-15129.yaml | 2 +- cves/2020/CVE-2020-15505.yaml | 2 +- cves/2020/CVE-2020-15920.yaml | 2 +- cves/2020/CVE-2020-16139.yaml | 2 +- cves/2020/CVE-2020-16846.yaml | 2 +- cves/2020/CVE-2020-16952.yaml | 2 +- cves/2020/CVE-2020-17505.yaml | 2 +- cves/2020/CVE-2020-17506.yaml | 2 +- cves/2020/CVE-2020-2096.yaml | 2 +- cves/2020/CVE-2020-2140.yaml | 2 +- cves/2020/CVE-2020-23972.yaml | 2 +- cves/2020/CVE-2020-24223.yaml | 2 +- cves/2020/CVE-2020-24312.yaml | 2 +- cves/2020/CVE-2020-2551.yaml | 2 +- cves/2020/CVE-2020-25540.yaml | 2 +- cves/2020/CVE-2020-26214.yaml | 2 +- cves/2020/CVE-2020-3187.yaml | 2 +- cves/2020/CVE-2020-3452.yaml | 2 +- cves/2020/CVE-2020-4463.yaml | 2 +- cves/2020/CVE-2020-5284.yaml | 2 +- cves/2020/CVE-2020-5405.yaml | 2 +- cves/2020/CVE-2020-5410.yaml | 2 +- cves/2020/CVE-2020-5412.yaml | 2 +- cves/2020/CVE-2020-5776.yaml | 2 +- cves/2020/CVE-2020-5777.yaml | 2 +- cves/2020/CVE-2020-5902.yaml | 2 +- cves/2020/CVE-2020-6287.yaml | 2 +- cves/2020/CVE-2020-7209.yaml | 2 +- cves/2020/CVE-2020-7318.yaml | 2 +- cves/2020/CVE-2020-7961.yaml | 2 +- cves/2020/CVE-2020-8091.yaml | 2 +- cves/2020/CVE-2020-8115.yaml | 2 +- cves/2020/CVE-2020-8163.yaml | 2 +- cves/2020/CVE-2020-8191.yaml | 2 +- cves/2020/CVE-2020-8193.yaml | 2 +- cves/2020/CVE-2020-8194.yaml | 2 +- cves/2020/CVE-2020-8209.yaml | 2 +- cves/2020/CVE-2020-8512.yaml | 2 +- cves/2020/CVE-2020-8982.yaml | 2 +- cves/2020/CVE-2020-9047.yaml | 2 +- cves/2020/CVE-2020-9344.yaml | 2 +- cves/2020/CVE-2020-9484.yaml | 2 +- cves/2020/CVE-2020-9496.yaml | 2 +- cves/2020/CVE-2020-9757.yaml | 2 +- 58 files changed, 58 insertions(+), 58 deletions(-) diff --git a/cves/2020/CVE-2020-0618.yaml b/cves/2020/CVE-2020-0618.yaml index 372cc27197..b123e8720c 100644 --- a/cves/2020/CVE-2020-0618.yaml +++ b/cves/2020/CVE-2020-0618.yaml @@ -1,4 +1,4 @@ -id: cve-2020-0618 +id: CVE-2020-0618 info: name: RCE in SQL Server Reporting Services diff --git a/cves/2020/CVE-2020-10148.yaml b/cves/2020/CVE-2020-10148.yaml index 464cf3fea0..b8b6171bf8 100644 --- a/cves/2020/CVE-2020-10148.yaml +++ b/cves/2020/CVE-2020-10148.yaml @@ -1,4 +1,4 @@ -id: cve-2020-10148 +id: CVE-2020-10148 info: name: SolarWinds Orion API Auth Bypass Leads to RCE (SUPERNOVA) diff --git a/cves/2020/CVE-2020-10199.yaml b/cves/2020/CVE-2020-10199.yaml index f160b2299c..593aa0ee30 100644 --- a/cves/2020/CVE-2020-10199.yaml +++ b/cves/2020/CVE-2020-10199.yaml @@ -1,4 +1,4 @@ -id: cve-2020-10199 +id: CVE-2020-10199 info: name: Nexus Repository Manager 3 RCE diff --git a/cves/2020/CVE-2020-10204.yaml b/cves/2020/CVE-2020-10204.yaml index 0b80de6f17..0c33f420c6 100644 --- a/cves/2020/CVE-2020-10204.yaml +++ b/cves/2020/CVE-2020-10204.yaml @@ -1,4 +1,4 @@ -id: cve-2020-10204 +id: CVE-2020-10204 info: name: Sonatype Nexus Repository RCE diff --git a/cves/2020/CVE-2020-11034.yaml b/cves/2020/CVE-2020-11034.yaml index 95db25bbe3..c45a1c0ad5 100644 --- a/cves/2020/CVE-2020-11034.yaml +++ b/cves/2020/CVE-2020-11034.yaml @@ -1,4 +1,4 @@ -id: cve-2020-11034 +id: CVE-2020-11034 info: name: GLPI v.9.4.6 - Open redirect diff --git a/cves/2020/CVE-2020-1147.yaml b/cves/2020/CVE-2020-1147.yaml index fbec644af2..4cd72e52fb 100644 --- a/cves/2020/CVE-2020-1147.yaml +++ b/cves/2020/CVE-2020-1147.yaml @@ -1,4 +1,4 @@ -id: cve-2020-1147 +id: CVE-2020-1147 info: name: RCE at SharePoint Server (.NET Framework & Visual Studio) detection diff --git a/cves/2020/CVE-2020-11738.yaml b/cves/2020/CVE-2020-11738.yaml index 6428e6f1fb..6f953b1906 100644 --- a/cves/2020/CVE-2020-11738.yaml +++ b/cves/2020/CVE-2020-11738.yaml @@ -1,4 +1,4 @@ -id: cve-2020-11738 +id: CVE-2020-11738 info: name: WordPress Duplicator plugin Directory Traversal diff --git a/cves/2020/CVE-2020-12116.yaml b/cves/2020/CVE-2020-12116.yaml index 8bed27a386..c151685af6 100644 --- a/cves/2020/CVE-2020-12116.yaml +++ b/cves/2020/CVE-2020-12116.yaml @@ -1,4 +1,4 @@ -id: cve-2020-12116 +id: CVE-2020-12116 info: name: Unauthenticated Zoho ManageEngine OpManger Arbitrary File Read diff --git a/cves/2020/CVE-2020-12720.yaml b/cves/2020/CVE-2020-12720.yaml index d904287870..dddcf2efb1 100644 --- a/cves/2020/CVE-2020-12720.yaml +++ b/cves/2020/CVE-2020-12720.yaml @@ -1,4 +1,4 @@ -id: cve-2020-12720 +id: CVE-2020-12720 info: name: CVE-2020-12720 vBulletin SQLI diff --git a/cves/2020/CVE-2020-13167.yaml b/cves/2020/CVE-2020-13167.yaml index a7697ee1d0..ad090a6ba3 100644 --- a/cves/2020/CVE-2020-13167.yaml +++ b/cves/2020/CVE-2020-13167.yaml @@ -1,4 +1,4 @@ -id: cve-2020-13167 +id: CVE-2020-13167 info: name: Netsweeper WebAdmin unixlogin.php Python Code Injection diff --git a/cves/2020/CVE-2020-13942.yaml b/cves/2020/CVE-2020-13942.yaml index afa9926a11..44ed589718 100644 --- a/cves/2020/CVE-2020-13942.yaml +++ b/cves/2020/CVE-2020-13942.yaml @@ -1,4 +1,4 @@ -id: cve-2020-13942 +id: CVE-2020-13942 info: name: Apache Unomi Remote Code Execution diff --git a/cves/2020/CVE-2020-14179.yaml b/cves/2020/CVE-2020-14179.yaml index dbfd221a78..9f17fc84b2 100644 --- a/cves/2020/CVE-2020-14179.yaml +++ b/cves/2020/CVE-2020-14179.yaml @@ -1,4 +1,4 @@ -id: cve-2020-14179 +id: CVE-2020-14179 info: name: Sensitive data exposure via insecure Jira endpoint diff --git a/cves/2020/CVE-2020-14181.yaml b/cves/2020/CVE-2020-14181.yaml index 491ba38738..76dfbddeaf 100644 --- a/cves/2020/CVE-2020-14181.yaml +++ b/cves/2020/CVE-2020-14181.yaml @@ -1,4 +1,4 @@ -id: cve-2020-14181 +id: CVE-2020-14181 info: name: User enumeration via insecure Jira endpoint diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 5540850ac3..70d8aa7ccd 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -1,4 +1,4 @@ -id: cve-2020-14882 +id: CVE-2020-14882 info: name: Oracle WebLogic Server Unauthenticated RCE (and Patch Bypass) diff --git a/cves/2020/CVE-2020-15129.yaml b/cves/2020/CVE-2020-15129.yaml index 78cb15a448..7bf33cb121 100644 --- a/cves/2020/CVE-2020-15129.yaml +++ b/cves/2020/CVE-2020-15129.yaml @@ -1,4 +1,4 @@ -id: cve-2020-15129 +id: CVE-2020-15129 info: name: Open-redirect in Traefik diff --git a/cves/2020/CVE-2020-15505.yaml b/cves/2020/CVE-2020-15505.yaml index eb062ee533..b13fc18c08 100644 --- a/cves/2020/CVE-2020-15505.yaml +++ b/cves/2020/CVE-2020-15505.yaml @@ -1,4 +1,4 @@ -id: cve-2020-15505 +id: CVE-2020-15505 info: name: RCE in MobileIron Core & Connector <= v10.6 & Sentry <= v9.8 diff --git a/cves/2020/CVE-2020-15920.yaml b/cves/2020/CVE-2020-15920.yaml index 5c2e00ab75..4ae47a7cfe 100644 --- a/cves/2020/CVE-2020-15920.yaml +++ b/cves/2020/CVE-2020-15920.yaml @@ -1,4 +1,4 @@ -id: cve-2020-15920 +id: CVE-2020-15920 info: name: Unauthenticated RCE at Mida eFramework on 'PDC/ajaxreq.php' diff --git a/cves/2020/CVE-2020-16139.yaml b/cves/2020/CVE-2020-16139.yaml index 760e1984d0..b8521bd8f1 100644 --- a/cves/2020/CVE-2020-16139.yaml +++ b/cves/2020/CVE-2020-16139.yaml @@ -1,4 +1,4 @@ -id: cve-2020-16139 +id: CVE-2020-16139 info: name: Cisco 7937G Denial-of-Service Reboot Attack diff --git a/cves/2020/CVE-2020-16846.yaml b/cves/2020/CVE-2020-16846.yaml index ad4d777912..b8c4d22e05 100644 --- a/cves/2020/CVE-2020-16846.yaml +++ b/cves/2020/CVE-2020-16846.yaml @@ -1,4 +1,4 @@ -id: cve-2020-16846 +id: CVE-2020-16846 info: name: SaltStack Shell Injection diff --git a/cves/2020/CVE-2020-16952.yaml b/cves/2020/CVE-2020-16952.yaml index 4180214c93..64051855aa 100644 --- a/cves/2020/CVE-2020-16952.yaml +++ b/cves/2020/CVE-2020-16952.yaml @@ -1,4 +1,4 @@ -id: cve-2020-16952 +id: CVE-2020-16952 info: name: Microsoft SharePoint Server-Side Include (SSI) and ViewState RCE diff --git a/cves/2020/CVE-2020-17505.yaml b/cves/2020/CVE-2020-17505.yaml index d727c4ce4a..eacf802b2a 100644 --- a/cves/2020/CVE-2020-17505.yaml +++ b/cves/2020/CVE-2020-17505.yaml @@ -1,4 +1,4 @@ -id: cve-2020-17505 +id: CVE-2020-17505 info: name: Artica Web Proxy 4.30 OS Command Injection diff --git a/cves/2020/CVE-2020-17506.yaml b/cves/2020/CVE-2020-17506.yaml index f3409415c2..fee3f8e5ff 100644 --- a/cves/2020/CVE-2020-17506.yaml +++ b/cves/2020/CVE-2020-17506.yaml @@ -1,4 +1,4 @@ -id: cve-2020-17506 +id: CVE-2020-17506 info: name: Artica Web Proxy 4.30 Authentication Bypass diff --git a/cves/2020/CVE-2020-2096.yaml b/cves/2020/CVE-2020-2096.yaml index 587f397c86..67deb53fcc 100644 --- a/cves/2020/CVE-2020-2096.yaml +++ b/cves/2020/CVE-2020-2096.yaml @@ -1,4 +1,4 @@ -id: cve-2020-2096 +id: CVE-2020-2096 info: name: Jenkins Gitlab Hook XSS diff --git a/cves/2020/CVE-2020-2140.yaml b/cves/2020/CVE-2020-2140.yaml index ea53cbafb0..2e7c90bae9 100644 --- a/cves/2020/CVE-2020-2140.yaml +++ b/cves/2020/CVE-2020-2140.yaml @@ -1,4 +1,4 @@ -id: cve-2020-2140 +id: CVE-2020-2140 info: author: j3ssie/geraldino2 name: Jenkin AuditTrailPlugin XSS diff --git a/cves/2020/CVE-2020-23972.yaml b/cves/2020/CVE-2020-23972.yaml index 6c50cd1650..2bb50aec48 100644 --- a/cves/2020/CVE-2020-23972.yaml +++ b/cves/2020/CVE-2020-23972.yaml @@ -1,4 +1,4 @@ -id: cve-2020-23972 +id: CVE-2020-23972 info: name: Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload diff --git a/cves/2020/CVE-2020-24223.yaml b/cves/2020/CVE-2020-24223.yaml index b771e94d39..c7f9ba3397 100644 --- a/cves/2020/CVE-2020-24223.yaml +++ b/cves/2020/CVE-2020-24223.yaml @@ -1,4 +1,4 @@ -id: cve-2020-24223 +id: CVE-2020-24223 info: name: Mara CMS 7.5 - Reflective Cross-Site Scripting diff --git a/cves/2020/CVE-2020-24312.yaml b/cves/2020/CVE-2020-24312.yaml index 8857313069..6176fda55c 100644 --- a/cves/2020/CVE-2020-24312.yaml +++ b/cves/2020/CVE-2020-24312.yaml @@ -1,4 +1,4 @@ -id: cve-2020-24312 +id: CVE-2020-24312 info: name: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure diff --git a/cves/2020/CVE-2020-2551.yaml b/cves/2020/CVE-2020-2551.yaml index a103025a76..8422bd7fc5 100644 --- a/cves/2020/CVE-2020-2551.yaml +++ b/cves/2020/CVE-2020-2551.yaml @@ -1,4 +1,4 @@ -id: cve-2020-2551 +id: CVE-2020-2551 info: name: Unauthenticated Oracle WebLogic Server RCE diff --git a/cves/2020/CVE-2020-25540.yaml b/cves/2020/CVE-2020-25540.yaml index a6f56c9053..bbb3f29336 100644 --- a/cves/2020/CVE-2020-25540.yaml +++ b/cves/2020/CVE-2020-25540.yaml @@ -1,4 +1,4 @@ -id: cve-2020-25540 +id: CVE-2020-25540 info: name: ThinkAdmin 6 - Arbitrarily File Read (CVE-2020-25540) diff --git a/cves/2020/CVE-2020-26214.yaml b/cves/2020/CVE-2020-26214.yaml index d5e0136a65..6fb32286ef 100644 --- a/cves/2020/CVE-2020-26214.yaml +++ b/cves/2020/CVE-2020-26214.yaml @@ -1,4 +1,4 @@ -id: cve-2020-26214 +id: CVE-2020-26214 info: name: Alerta Authentication Bypass (CVE-2020-26214) diff --git a/cves/2020/CVE-2020-3187.yaml b/cves/2020/CVE-2020-3187.yaml index 109c68ca43..64a9c701a7 100644 --- a/cves/2020/CVE-2020-3187.yaml +++ b/cves/2020/CVE-2020-3187.yaml @@ -1,4 +1,4 @@ -id: cve-2020-3187 +id: CVE-2020-3187 # Reference: https://twitter.com/aboul3la/status/1286809567989575685 diff --git a/cves/2020/CVE-2020-3452.yaml b/cves/2020/CVE-2020-3452.yaml index 9ad81bcfa0..de9fd55b7b 100644 --- a/cves/2020/CVE-2020-3452.yaml +++ b/cves/2020/CVE-2020-3452.yaml @@ -1,4 +1,4 @@ -id: cve-2020-3452 +id: CVE-2020-3452 # Source: https://twitter.com/aboul3la/status/1286012324722155525 diff --git a/cves/2020/CVE-2020-4463.yaml b/cves/2020/CVE-2020-4463.yaml index fd1df1a8b6..fa0aecd33f 100644 --- a/cves/2020/CVE-2020-4463.yaml +++ b/cves/2020/CVE-2020-4463.yaml @@ -1,4 +1,4 @@ -id: cve-2020-4463 +id: CVE-2020-4463 info: name: IBM Maximo Asset Management Information Disclosure via XXE diff --git a/cves/2020/CVE-2020-5284.yaml b/cves/2020/CVE-2020-5284.yaml index ff1891d22d..017459d586 100644 --- a/cves/2020/CVE-2020-5284.yaml +++ b/cves/2020/CVE-2020-5284.yaml @@ -1,4 +1,4 @@ -id: cve-2020-5284 +id: CVE-2020-5284 info: name: Next.js .next/ limited path traversal diff --git a/cves/2020/CVE-2020-5405.yaml b/cves/2020/CVE-2020-5405.yaml index a2febff61c..ce0ecc2d90 100644 --- a/cves/2020/CVE-2020-5405.yaml +++ b/cves/2020/CVE-2020-5405.yaml @@ -1,4 +1,4 @@ -id: cve-2020-5405 +id: CVE-2020-5405 info: name: Spring Cloud Directory Traversal diff --git a/cves/2020/CVE-2020-5410.yaml b/cves/2020/CVE-2020-5410.yaml index faa3898cc1..bca532c9bf 100644 --- a/cves/2020/CVE-2020-5410.yaml +++ b/cves/2020/CVE-2020-5410.yaml @@ -1,4 +1,4 @@ -id: cve-2020-5410 +id: CVE-2020-5410 info: name: Directory Traversal in Spring Cloud Config Server diff --git a/cves/2020/CVE-2020-5412.yaml b/cves/2020/CVE-2020-5412.yaml index 96d3227a54..f4040f26f5 100644 --- a/cves/2020/CVE-2020-5412.yaml +++ b/cves/2020/CVE-2020-5412.yaml @@ -1,4 +1,4 @@ -id: cve-2020-5412 +id: CVE-2020-5412 info: name: Full-read SSRF in Spring Cloud Netflix (Hystrix Dashboard) diff --git a/cves/2020/CVE-2020-5776.yaml b/cves/2020/CVE-2020-5776.yaml index a46ece8576..5a04ba81be 100644 --- a/cves/2020/CVE-2020-5776.yaml +++ b/cves/2020/CVE-2020-5776.yaml @@ -1,4 +1,4 @@ -id: cve-2020-5776 +id: CVE-2020-5776 info: name: Cross Site Request Forgery (CSRF) in MAGMI (Magento Mass Importer) Plugin diff --git a/cves/2020/CVE-2020-5777.yaml b/cves/2020/CVE-2020-5777.yaml index 8d71eb2c66..cc1fd67f40 100644 --- a/cves/2020/CVE-2020-5777.yaml +++ b/cves/2020/CVE-2020-5777.yaml @@ -1,4 +1,4 @@ -id: cve-2020-5777 +id: CVE-2020-5777 info: name: "Remote Auth Bypass in MAGMI (Magento Mass Importer) Plugin <= v0.7.23" diff --git a/cves/2020/CVE-2020-5902.yaml b/cves/2020/CVE-2020-5902.yaml index 45568f2367..fadb2254f3 100644 --- a/cves/2020/CVE-2020-5902.yaml +++ b/cves/2020/CVE-2020-5902.yaml @@ -1,4 +1,4 @@ -id: cve-2020-5902 +id: CVE-2020-5902 info: name: F5 BIG-IP TMUI RCE diff --git a/cves/2020/CVE-2020-6287.yaml b/cves/2020/CVE-2020-6287.yaml index 3042e65a83..f99943bae8 100644 --- a/cves/2020/CVE-2020-6287.yaml +++ b/cves/2020/CVE-2020-6287.yaml @@ -1,4 +1,4 @@ -id: cve-2020-6287 +id: CVE-2020-6287 info: name: Create an Administrative User in SAP NetWeaver AS JAVA (LM Configuration Wizard) diff --git a/cves/2020/CVE-2020-7209.yaml b/cves/2020/CVE-2020-7209.yaml index 1fa11a99df..3c256e5fc9 100644 --- a/cves/2020/CVE-2020-7209.yaml +++ b/cves/2020/CVE-2020-7209.yaml @@ -1,4 +1,4 @@ -id: cve-2020-7209 +id: CVE-2020-7209 info: name: LinuxKI Toolset 6.01 Remote Command Execution diff --git a/cves/2020/CVE-2020-7318.yaml b/cves/2020/CVE-2020-7318.yaml index af2e7d7384..84aad2501b 100644 --- a/cves/2020/CVE-2020-7318.yaml +++ b/cves/2020/CVE-2020-7318.yaml @@ -1,4 +1,4 @@ -id: cve-2020-7318 +id: CVE-2020-7318 info: name: McAfee ePolicy Orchestrator Reflected XSS diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index d39e065d85..37212b88b1 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -1,4 +1,4 @@ -id: cve-2020-7961 +id: CVE-2020-7961 info: name: Liferay Portal Unauthenticated RCE diff --git a/cves/2020/CVE-2020-8091.yaml b/cves/2020/CVE-2020-8091.yaml index 68c9109a22..1db40c2759 100644 --- a/cves/2020/CVE-2020-8091.yaml +++ b/cves/2020/CVE-2020-8091.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8091 +id: CVE-2020-8091 info: name: TYPO3 Cross-Site Scripting Vulnerability diff --git a/cves/2020/CVE-2020-8115.yaml b/cves/2020/CVE-2020-8115.yaml index b404c7d217..34775d22a2 100644 --- a/cves/2020/CVE-2020-8115.yaml +++ b/cves/2020/CVE-2020-8115.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8115 +id: CVE-2020-8115 info: name: Revive Adserver XSS diff --git a/cves/2020/CVE-2020-8163.yaml b/cves/2020/CVE-2020-8163.yaml index 09edf10e9f..4d8d1df15d 100644 --- a/cves/2020/CVE-2020-8163.yaml +++ b/cves/2020/CVE-2020-8163.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8163 +id: CVE-2020-8163 info: name: Potential Remote Code Execution on Rails diff --git a/cves/2020/CVE-2020-8191.yaml b/cves/2020/CVE-2020-8191.yaml index 64fde9b670..87c0635817 100644 --- a/cves/2020/CVE-2020-8191.yaml +++ b/cves/2020/CVE-2020-8191.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8191 +id: CVE-2020-8191 info: name: Citrix ADC & NetScaler Gateway Reflected XSS diff --git a/cves/2020/CVE-2020-8193.yaml b/cves/2020/CVE-2020-8193.yaml index 658af84a9b..23c8f2e624 100644 --- a/cves/2020/CVE-2020-8193.yaml +++ b/cves/2020/CVE-2020-8193.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8193 +id: CVE-2020-8193 info: name: Citrix unauthenticated LFI diff --git a/cves/2020/CVE-2020-8194.yaml b/cves/2020/CVE-2020-8194.yaml index feaaec5f2f..fa24d7667c 100644 --- a/cves/2020/CVE-2020-8194.yaml +++ b/cves/2020/CVE-2020-8194.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8194 +id: CVE-2020-8194 info: name: Citrix ADC & NetScaler Gateway Reflected Code Injection diff --git a/cves/2020/CVE-2020-8209.yaml b/cves/2020/CVE-2020-8209.yaml index c24ee6d808..39eff9a433 100644 --- a/cves/2020/CVE-2020-8209.yaml +++ b/cves/2020/CVE-2020-8209.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8209 +id: CVE-2020-8209 info: name: Citrix XenMobile Server Path Traversal diff --git a/cves/2020/CVE-2020-8512.yaml b/cves/2020/CVE-2020-8512.yaml index 704c881473..b5416bc04a 100644 --- a/cves/2020/CVE-2020-8512.yaml +++ b/cves/2020/CVE-2020-8512.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8512 +id: CVE-2020-8512 info: name: IceWarp WebMail XSS diff --git a/cves/2020/CVE-2020-8982.yaml b/cves/2020/CVE-2020-8982.yaml index 79d55165a5..1070989ac4 100644 --- a/cves/2020/CVE-2020-8982.yaml +++ b/cves/2020/CVE-2020-8982.yaml @@ -1,4 +1,4 @@ -id: cve-2020-8982 +id: CVE-2020-8982 info: name: Citrix ShareFile StorageZones Unauthenticated Arbitrary File Read diff --git a/cves/2020/CVE-2020-9047.yaml b/cves/2020/CVE-2020-9047.yaml index 075fb5bb06..4761bac1d4 100644 --- a/cves/2020/CVE-2020-9047.yaml +++ b/cves/2020/CVE-2020-9047.yaml @@ -1,4 +1,4 @@ -id: cve-2020-9047 +id: CVE-2020-9047 info: name: exacqVision Web Service RCE diff --git a/cves/2020/CVE-2020-9344.yaml b/cves/2020/CVE-2020-9344.yaml index f997fb34a3..cd3927cf18 100644 --- a/cves/2020/CVE-2020-9344.yaml +++ b/cves/2020/CVE-2020-9344.yaml @@ -1,4 +1,4 @@ -id: cve-2020-9344 +id: CVE-2020-9344 info: name: Jira Subversion ALM for enterprise XSS diff --git a/cves/2020/CVE-2020-9484.yaml b/cves/2020/CVE-2020-9484.yaml index 11d91627a2..d9faeed998 100644 --- a/cves/2020/CVE-2020-9484.yaml +++ b/cves/2020/CVE-2020-9484.yaml @@ -1,4 +1,4 @@ -id: cve-2020-9484 +id: CVE-2020-9484 info: name: Apache Tomcat RCE by deserialization diff --git a/cves/2020/CVE-2020-9496.yaml b/cves/2020/CVE-2020-9496.yaml index 5e9cdd1ea9..6949fb8abc 100644 --- a/cves/2020/CVE-2020-9496.yaml +++ b/cves/2020/CVE-2020-9496.yaml @@ -1,4 +1,4 @@ -id: cve-2020-9496 +id: CVE-2020-9496 info: name: Apache OFBiz XML-RPC Java Deserialization diff --git a/cves/2020/CVE-2020-9757.yaml b/cves/2020/CVE-2020-9757.yaml index 3439823142..5c1a25025f 100644 --- a/cves/2020/CVE-2020-9757.yaml +++ b/cves/2020/CVE-2020-9757.yaml @@ -1,4 +1,4 @@ -id: cve-2020-9757 +id: CVE-2020-9757 info: name: SEOmatic < 3.3.0 Server-Side Template Injection