"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-03-12 23:01:11 +00:00
parent cb22b44503
commit 0784bcfb65
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
9 changed files with 316 additions and 6 deletions

View File

@ -186,6 +186,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K93144355?utm_source=f5support&utm_medium=RSS", "name": "https://support.f5.com/csp/article/K93144355?utm_source=f5support&utm_medium=RSS",
"url": "https://support.f5.com/csp/article/K93144355?utm_source=f5support&utm_medium=RSS" "url": "https://support.f5.com/csp/article/K93144355?utm_source=f5support&utm_medium=RSS"
},
{
"refsource": "GENTOO",
"name": "GLSA-202003-04",
"url": "https://security.gentoo.org/glsa/202003-04"
} }
] ]
} }

View File

@ -0,0 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-17653",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiSIEM",
"version": {
"version_data": [
{
"version_value": "5.2.5"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/psirt/FG-IR-19-240",
"url": "https://fortiguard.com/psirt/FG-IR-19-240"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link."
}
]
}
}

View File

@ -85,6 +85,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9962&LanguageCode=en&DocumentPartId=&Action=Launch", "name": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9962&LanguageCode=en&DocumentPartId=&Action=Launch",
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9962&LanguageCode=en&DocumentPartId=&Action=Launch" "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9962&LanguageCode=en&DocumentPartId=&Action=Launch"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-072-02",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-02"
} }
] ]
}, },

View File

@ -61,6 +61,11 @@
"url": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40", "url": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40" "name": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200312 [SECURITY] [DLA 2141-1] yubikey-val security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00014.html"
} }
] ]
} }

View File

@ -61,6 +61,11 @@
"url": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40", "url": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40" "name": "https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200312 [SECURITY] [DLA 2141-1] yubikey-val security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00014.html"
} }
] ]
} }

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-10534",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://phabricator.wikimedia.org/T229731",
"refsource": "MISC",
"name": "https://phabricator.wikimedia.org/T229731"
},
{
"url": "https://gerrit.wikimedia.org/r/#/q/I9cc5fb2c08c78bbd797a5fc6d89f4577c8cc118b",
"refsource": "MISC",
"name": "https://gerrit.wikimedia.org/r/#/q/I9cc5fb2c08c78bbd797a5fc6d89f4577c8cc118b"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-10535",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GitLab 12.8.x before 12.8.6, when sign-up is enabled, allows remote attackers to bypass email domain restrictions within the two-day grace period for an unconfirmed email address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://about.gitlab.com/releases/2020/03/11/critical-security-release-gitlab-12-dot-8-dot-6-released/",
"refsource": "MISC",
"name": "https://about.gitlab.com/releases/2020/03/11/critical-security-release-gitlab-12-dot-8-dot-6-released/"
}
]
}
}

View File

@ -4,14 +4,64 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-1863", "ID": "CVE-2020-1863",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "psirt@huawei.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Huawei",
"product": {
"product_data": [
{
"product_name": "Huawei USG6000V",
"version": {
"version_data": [
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V500R005C00SPC100"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out of Bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200311-01-buffer-en",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200311-01-buffer-en"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Huawei USG6000V with versions V500R001C20SPC300, V500R003C00SPC100, and V500R005C00SPC100 have an out-of-bounds read vulnerability. Due to a logical flaw in a JSON parsing routine, a remote, unauthenticated attacker could exploit this vulnerability to disrupt service in the affected products."
} }
] ]
} }

View File

@ -4,14 +4,63 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-7600", "ID": "CVE-2020-7600",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "report@snyk.io",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "querymen",
"version": {
"version_data": [
{
"version_value": "All versions prior to 2.1.4"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Prototype Pollution"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef",
"url": "https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef"
},
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867",
"url": "https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks."
} }
] ]
} }