mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 03:02:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
6c92aeac62
commit
18654c0f01
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-1811",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "GaussDB 200",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "6.5.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Command Injection"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200120-01-gaussdb200-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200120-01-gaussdb200-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "GaussDB 200 with version of 6.5.1 have a command injection vulnerability. Due to insufficient input validation, remote attackers with low permissions could exploit this vulnerability by sending crafted commands to the affected device. Successful exploit could allow an attacker to execute commands."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,83 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-1815",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "NIP6800",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60SPC500"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Secospace USG6600, USG9500",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30SPC200"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C30SPC600"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60SPC500"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Memory Leak"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,83 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-1816",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "NIP6800",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60SPC500"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Secospace USG6600, USG9500",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30SPC200"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C30SPC600"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60SPC500"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Denial of Service"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,83 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-1830",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "NIP6800",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60SPC500"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Secospace USG6600, USG9500",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30SPC200"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C30SPC600"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60SPC500"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Small OOB Read"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,94 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-1882",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Ever-L29B",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 10.0.0.180(C185E6R3P3)"
|
||||
},
|
||||
{
|
||||
"version_value": "earlier than 10.0.0.180(C432E6R1P7)"
|
||||
},
|
||||
{
|
||||
"version_value": "earlier than 10.0.0.180(C636E5R2P3)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "HUAWEI Mate 20 RS",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 10.0.0.175(C786E70R3P8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "HUAWEI Mate 20 X",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 10.0.0.176(C00E70R2P8)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Honor Magic2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "earlier than 10.0.0.175(C00E59R2P11)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Improper Authorization"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); and Honor Magic2 versions earlier than 10.0.0.175(C00E59R2P11) have an improper authorization vulnerability. Due to improper authorization of some function, attackers can bypass the authorization to perform some operations."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user