"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-12-03 12:01:48 +00:00
parent 88b9a9e1c3
commit 1244edec1f
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 58 additions and 22 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5638",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.desknets.com/neo/support/mainte/9700/"
"url": "https://www.desknets.com/neo/support/mainte/9700/",
"refsource": "MISC",
"name": "https://www.desknets.com/neo/support/mainte/9700/"
},
{
"url": "https://jvn.jp/en/jp/JVN42199826/index.html"
"url": "https://jvn.jp/en/jp/JVN42199826/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN42199826/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5676",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://github.com/weseek/growi"
"url": "https://github.com/weseek/growi",
"refsource": "MISC",
"name": "https://github.com/weseek/growi"
},
{
"url": "https://hub.docker.com/r/weseek/growi/"
"url": "https://hub.docker.com/r/weseek/growi/",
"refsource": "MISC",
"name": "https://hub.docker.com/r/weseek/growi/"
},
{
"url": "https://jvn.jp/en/jp/JVN56450373/index.html"
"url": "https://jvn.jp/en/jp/JVN56450373/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN56450373/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5677",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://github.com/weseek/growi"
"url": "https://github.com/weseek/growi",
"refsource": "MISC",
"name": "https://github.com/weseek/growi"
},
{
"url": "https://hub.docker.com/r/weseek/growi/"
"url": "https://hub.docker.com/r/weseek/growi/",
"refsource": "MISC",
"name": "https://hub.docker.com/r/weseek/growi/"
},
{
"url": "https://jvn.jp/en/jp/JVN56450373/index.html"
"url": "https://jvn.jp/en/jp/JVN56450373/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN56450373/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5678",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://github.com/weseek/growi"
"url": "https://github.com/weseek/growi",
"refsource": "MISC",
"name": "https://github.com/weseek/growi"
},
{
"url": "https://hub.docker.com/r/weseek/growi/"
"url": "https://hub.docker.com/r/weseek/growi/",
"refsource": "MISC",
"name": "https://hub.docker.com/r/weseek/growi/"
},
{
"url": "https://jvn.jp/en/jp/JVN56450373/index.html"
"url": "https://jvn.jp/en/jp/JVN56450373/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN56450373/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5679",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.ec-cube.net/info/weakness/"
"url": "https://www.ec-cube.net/info/weakness/",
"refsource": "MISC",
"name": "https://www.ec-cube.net/info/weakness/"
},
{
"url": "https://jvn.jp/en/jp/JVN24457594/index.html"
"url": "https://jvn.jp/en/jp/JVN24457594/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN24457594/index.html"
}
]
},
@ -55,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "Improper restriction of rendered UI layers or frames in EC-CUBE versions from 3.0.0 to 3.0.18 leads to clickjacking attacks. If a user accesses a specially crafted page while logged into the administrative page, unintended operations may be conducted."
"value": "Improper restriction of rendered UI layers or frames in EC-CUBE versions from 3.0.0 to 3.0.18 leads to clickjacking attacks. If a user accesses a specially crafted page while logged into the administrative page, unintended operations may be conducted."
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5680",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.ec-cube.net/info/weakness/"
"url": "https://www.ec-cube.net/info/weakness/",
"refsource": "MISC",
"name": "https://www.ec-cube.net/info/weakness/"
},
{
"url": "https://jvn.jp/en/jp/JVN24457594/index.html"
"url": "https://jvn.jp/en/jp/JVN24457594/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN24457594/index.html"
}
]
},