mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d339b2ab7f
commit
1474a39671
@ -19,7 +19,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.181(C00E87R2P20T8)"
|
||||
"version_value": "earlier than 9.0.0.181(C00E87R2P20T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -29,7 +29,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.201(C432E4R1P9)"
|
||||
"version_value": "earlier than 9.0.0.201(C432E4R1P9)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -39,10 +39,10 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.177(C185E2R1P12T8)"
|
||||
"version_value": "earlier than 9.0.0.177(C185E2R1P12T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.195(C636E2R1P12)"
|
||||
"version_value": "earlier than 9.0.0.195(C636E2R1P12)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -52,7 +52,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.168(C00)"
|
||||
"version_value": "earlier than 8.0.0.168(C00)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,7 +62,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.181(C00E88R2P15T8)"
|
||||
"version_value": "earlier than 9.0.0.181(C00E88R2P15T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -72,10 +72,10 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.177(C185E2R1P13T8)"
|
||||
"version_value": "earlier than 9.0.0.177(C185E2R1P13T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.206(C432E4R1P11)"
|
||||
"version_value": "earlier than 9.0.0.206(C432E4R1P11)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -85,16 +85,16 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.179(C576E2R1P7T8)"
|
||||
"version_value": "earlier than 9.0.0.179(C576E2R1P7T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.194(C185E2R1P13)"
|
||||
"version_value": "earlier than 9.0.0.194(C185E2R1P13)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.206(C432E4R1P11)"
|
||||
"version_value": "earlier than 9.0.0.206(C432E4R1P11)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.210(C635E4R1P13)"
|
||||
"version_value": "earlier than 9.0.0.210(C635E4R1P13)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,7 +104,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.156(C00E156R2P14T8)"
|
||||
"version_value": "earlier than 9.0.0.156(C00E156R2P14T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -114,10 +114,10 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.172(C432)"
|
||||
"version_value": "earlier than 8.0.0.172(C432)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.173(C636)"
|
||||
"version_value": "earlier than 8.0.0.173(C636)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -127,25 +127,25 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.159(C185E2R1P12T8)"
|
||||
"version_value": "earlier than 9.0.0.159(C185E2R1P12T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.159(C461E2R1P11T8)"
|
||||
"version_value": "earlier than 9.0.0.159(C461E2R1P11T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.160(C432E7R1P11T8)"
|
||||
"version_value": "earlier than 9.0.0.160(C432E7R1P11T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.165(C605E2R1P12)"
|
||||
"version_value": "earlier than 9.0.0.165(C605E2R1P12)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.168(C636E7R1P13T8)"
|
||||
"version_value": "earlier than 9.0.0.168(C636E7R1P13T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.168(C782E3R1P11T8)"
|
||||
"version_value": "earlier than 9.0.0.168(C782E3R1P11T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.0.0.196(C635E2R1P11T8)"
|
||||
"version_value": "earlier than 9.0.0.196(C635E2R1P11T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -155,66 +155,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.130(C605E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Figo-L21",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.130(C185E6R1P5T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.1.0.130(C635E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Figo-L23",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.130(C605E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Figo-L31",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.130(C432E8R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Florida-L03",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.121(C605E5R1P1T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Florida-L21",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.129(C605)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.131(C432)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.132(C185)"
|
||||
"version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -226,12 +167,71 @@
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Figo-L21",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "earlier than 9.1.0.130(C635E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Figo-L23",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Figo-L31",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 9.1.0.130(C432E8R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Florida-L03",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 9.1.0.121(C605E5R1P1T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Florida-L21",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 8.0.0.129(C605)"
|
||||
},
|
||||
{
|
||||
"version_value": "earlier than 8.0.0.131(C432)"
|
||||
},
|
||||
{
|
||||
"version_value": "earlier than 8.0.0.132(C185)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Florida-L22",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.132(C636)"
|
||||
"version_value": "earlier than 8.0.0.132(C636)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -241,7 +241,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.144(C605)"
|
||||
"version_value": "earlier than 8.0.0.144(C605)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -251,20 +251,20 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.130(C185E6R1P5T8)"
|
||||
"version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.1.0.130(C605E6R1P5T8)"
|
||||
"version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "HUAWEI P smart, HUAWEI Y7s",
|
||||
"product_name": "HUAWEI P smart,HUAWEI Y7s",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.124(C636E6R1P5T8)"
|
||||
"version_value": "earlier than 9.1.0.124(C636E6R1P5T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -274,54 +274,61 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.148(C635)"
|
||||
"version_value": "earlier than 8.0.0.148(C635)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.155(C185)"
|
||||
"version_value": "earlier than 8.0.0.155(C185)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.155(C605)"
|
||||
"version_value": "earlier than 8.0.0.155(C605)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.156(C605)"
|
||||
"version_value": "earlier than 8.0.0.156(C605)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.157(C432)"
|
||||
"version_value": "earlier than 8.0.0.157(C432)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "HUAWEI nova 3e, HUAWEI P20 lite",
|
||||
"product_name": "HUAWEI nova 3e,HUAWEI P20 lite",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.147(C461)"
|
||||
"version_value": "earlier than 8.0.0.147(C461)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.148(ZAFC185)"
|
||||
"version_value": "earlier than 8.0.0.148(ZAFC185)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.160(C185)"
|
||||
"version_value": "earlier than 8.0.0.160(C185)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.160(C605)"
|
||||
"version_value": "earlier than 8.0.0.160(C605)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.168(C432)"
|
||||
"version_value": "earlier than 8.0.0.168(C432)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 8.0.0.172(C636)"
|
||||
"version_value": "earlier than 8.0.0.172(C636)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Honor View 10",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.0.0.202(C567E6R1P12T8)"
|
||||
"version_value": "earlier than 9.0.0.202(C567E6R1P12T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -331,7 +338,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.182(C00)"
|
||||
"version_value": "earlier than 8.0.0.182(C00)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -341,10 +348,10 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.135(C185)"
|
||||
"version_value": "earlier than 8.0.0.135(C185)"
|
||||
},
|
||||
{
|
||||
"version_value": "< 9.1.0.118(C636E4R1P1T8)"
|
||||
"version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -354,7 +361,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.118(C636E4R1P1T8)"
|
||||
"version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -364,7 +371,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 9.1.0.118(C636E4R1P1T8)"
|
||||
"version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -374,7 +381,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 8.0.0.139(C432)"
|
||||
"version_value": "earlier than 8.0.0.139(C432)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -410,7 +417,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Some Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. The affected products and versions are: ALP-AL00B Versions earlier than 9.0.0.181(C00E87R2P20T8) ALP-L09 Versions earlier than 9.0.0.201(C432E4R1P9) ALP-L29 Versions earlier than 9.0.0.177(C185E2R1P12T8), Versions earlier than 9.0.0.195(C636E2R1P12) Anne-AL00 Versions earlier than 8.0.0.168(C00) BLA-AL00B Versions earlier than 9.0.0.181(C00E88R2P15T8) BLA-L09C Versions earlier than 9.0.0.177(C185E2R1P13T8), Versions earlier than 9.0.0.206(C432E4R1P11) BLA-L29C Versions earlier than 9.0.0.179(C576E2R1P7T8), Versions earlier than 9.0.0.194(C185E2R1P13), Versions earlier than 9.0.0.206(C432E4R1P11), Versions earlier than 9.0.0.210(C635E4R1P13) Berkeley-AL20 Versions earlier than 9.0.0.156(C00E156R2P14T8) Berkeley-L09 Versions earlier than 8.0.0.172(C432), Versions earlier than 8.0.0.173(C636) Emily-L29C Versions earlier than 9.0.0.159(C185E2R1P12T8), Versions earlier than 9.0.0.159(C461E2R1P11T8), Versions earlier than 9.0.0.160(C432E7R1P11T8), Versions earlier than 9.0.0.165(C605E2R1P12), Versions earlier than 9.0.0.168(C636E7R1P13T8), Versions earlier than 9.0.0.168(C782E3R1P11T8), Versions earlier than 9.0.0.196(C635E2R1P11T8) Figo-L03 Versions earlier than 9.1.0.130(C605E6R1P5T8) Figo-L21 Versions earlier than 9.1.0.130(C185E6R1P5T8), Versions earlier than 9.1.0.130(C635E6R1P5T8) Figo-L23 Versions earlier than 9.1.0.130(C605E6R1P5T8) Figo-L31 Versions earlier than 9.1.0.130(C432E8R1P5T8) Florida-L03 Versions earlier than 9.1.0.121(C605E5R1P1T8) Florida-L21 Versions earlier than 8.0.0.129(C605), Versions earlier than 8.0.0.131(C432), Versions earlier than 8.0.0.132(C185) Florida-L22 Versions earlier than 8.0.0.132(C636) Florida-L23 Versions earlier than 8.0.0.144(C605) HUAWEI P smart Versions earlier than 9.1.0.130(C185E6R1P5T8), Versions earlier than 9.1.0.130(C605E6R1P5T8) HUAWEI P smart, HUAWEI Y7s Versions earlier than 9.1.0.124(C636E6R1P5T8) HUAWEI P20 lite Versions earlier than 8.0.0.148(C635), Versions earlier than 8.0.0.155(C185), Versions earlier than 8.0.0.155(C605), Versions earlier than 8.0.0.156(C605), Versions earlier than 8.0.0.157(C432) HUAWEI nova 3e, HUAWEI P20 lite Versions earlier than 8.0.0.147(C461), Versions earlier than 8.0.0.148(ZAFC185), Versions earlier than 8.0.0.160(C185), Versions earlier than 8.0.0.160(C605), Versions earlier than 8.0.0.168(C432), Versions earlier than 8.0.0.172(C636) Honor View 10 Versions earlier than 9.0.0.202(C567E6R1P12T8) Leland-AL00A Versions earlier than 8.0.0.182(C00) Leland-L21A Versions earlier than 8.0.0.135(C185), Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L22A Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L22C Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L31A Versions earlier than 8.0.0.139(C432)"
|
||||
"value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-11994",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "security@apache.org",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Apache Camel",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Camel 2.25.0 to 2.25.1, Camel 3.0.0 to 3.3.0. The unsupported Camel 2.x (2.24 and earlier) versions may be also affected."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Server-Side Template Injection and arbitrary file disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Server-Side Template Injection and arbitrary file disclosure on Camel templating components"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"url": "https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4720",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4720"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5839",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "secure@symantec.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Symantec Endpoint Detection And Response",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Prior to 4.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://support.broadcom.com/security-advisory/content/security-advisories/SEDR-Information-Disclosure/SYMSA16090",
|
||||
"url": "https://support.broadcom.com/security-advisory/content/security-advisories/SEDR-Information-Disclosure/SYMSA16090"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Symantec Endpoint Detection And Response, prior to 4.4, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,63 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6938",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "security@salesforce.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Tableau",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "10.5, 2018.1, 2018.2, 2018.3, 2019.1, 2019.2, 2019.3, 2019.4, 2020.1, 2020.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Sensitive Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://help.salesforce.com/apex/HTViewSolution?urlname=Sensitive-information-disclosure-vulnerability-affecting-Tableau-Server-in-certain-use-cases&language=en_US",
|
||||
"url": "https://help.salesforce.com/apex/HTViewSolution?urlname=Sensitive-information-disclosure-vulnerability-affecting-Tableau-Server-in-certain-use-cases&language=en_US"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://help.salesforce.com/articleView?id=000354158&type=1&mode=1",
|
||||
"url": "https://help.salesforce.com/articleView?id=000354158&type=1&mode=1"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A sensitive information disclosure vulnerability in Tableau Server 10.5, 2018.x, 2019.x, 2020.x released before June 26, 2020, could allow access to sensitive information in log files."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user