From 225b7a7ff0f271bd9202d6c918dcd7f22189103a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 20 Mar 2020 17:01:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15661.json | 72 ++++++++++++++++++++++++++++++++++ 2020/10xxx/CVE-2020-10775.json | 18 +++++++++ 2020/10xxx/CVE-2020-10776.json | 18 +++++++++ 2020/10xxx/CVE-2020-10777.json | 18 +++++++++ 2020/10xxx/CVE-2020-10778.json | 18 +++++++++ 2020/10xxx/CVE-2020-10779.json | 18 +++++++++ 2020/10xxx/CVE-2020-10780.json | 18 +++++++++ 2020/10xxx/CVE-2020-10781.json | 18 +++++++++ 2020/10xxx/CVE-2020-10782.json | 18 +++++++++ 2020/10xxx/CVE-2020-10783.json | 18 +++++++++ 2020/10xxx/CVE-2020-10784.json | 18 +++++++++ 2020/10xxx/CVE-2020-10785.json | 18 +++++++++ 2020/10xxx/CVE-2020-10786.json | 18 +++++++++ 2020/10xxx/CVE-2020-10787.json | 18 +++++++++ 2020/3xxx/CVE-2020-3950.json | 5 +++ 15 files changed, 311 insertions(+) create mode 100644 2019/15xxx/CVE-2019-15661.json create mode 100644 2020/10xxx/CVE-2020-10775.json create mode 100644 2020/10xxx/CVE-2020-10776.json create mode 100644 2020/10xxx/CVE-2020-10777.json create mode 100644 2020/10xxx/CVE-2020-10778.json create mode 100644 2020/10xxx/CVE-2020-10779.json create mode 100644 2020/10xxx/CVE-2020-10780.json create mode 100644 2020/10xxx/CVE-2020-10781.json create mode 100644 2020/10xxx/CVE-2020-10782.json create mode 100644 2020/10xxx/CVE-2020-10783.json create mode 100644 2020/10xxx/CVE-2020-10784.json create mode 100644 2020/10xxx/CVE-2020-10785.json create mode 100644 2020/10xxx/CVE-2020-10786.json create mode 100644 2020/10xxx/CVE-2020-10787.json diff --git a/2019/15xxx/CVE-2019-15661.json b/2019/15xxx/CVE-2019-15661.json new file mode 100644 index 00000000000..d6fe7d2ccf1 --- /dev/null +++ b/2019/15xxx/CVE-2019-15661.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15661", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Rivet Killer Control Center before 2.1.1352. IOCTL 0x120004 in KfeCo10X64.sys fails to validate parameters, leading to a stack-based buffer overflow, which can lead to code execution or escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.killernetworking.com", + "refsource": "MISC", + "name": "https://www.killernetworking.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.killernetworking.com/downloads/ReleaseNotes/KillerSoftware_Release_Notes_2.1.1352.pdf", + "url": "https://support.killernetworking.com/downloads/ReleaseNotes/KillerSoftware_Release_Notes_2.1.1352.pdf" + }, + { + "refsource": "MISC", + "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0005/FEYE-2019-0005.md", + "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0005/FEYE-2019-0005.md" + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10775.json b/2020/10xxx/CVE-2020-10775.json new file mode 100644 index 00000000000..0e87af27a1c --- /dev/null +++ b/2020/10xxx/CVE-2020-10775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10776.json b/2020/10xxx/CVE-2020-10776.json new file mode 100644 index 00000000000..5293f6fd043 --- /dev/null +++ b/2020/10xxx/CVE-2020-10776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10777.json b/2020/10xxx/CVE-2020-10777.json new file mode 100644 index 00000000000..4581aac2ab5 --- /dev/null +++ b/2020/10xxx/CVE-2020-10777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10778.json b/2020/10xxx/CVE-2020-10778.json new file mode 100644 index 00000000000..9a349d16648 --- /dev/null +++ b/2020/10xxx/CVE-2020-10778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10779.json b/2020/10xxx/CVE-2020-10779.json new file mode 100644 index 00000000000..8c5bf632beb --- /dev/null +++ b/2020/10xxx/CVE-2020-10779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10780.json b/2020/10xxx/CVE-2020-10780.json new file mode 100644 index 00000000000..e8e8d3bf230 --- /dev/null +++ b/2020/10xxx/CVE-2020-10780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10781.json b/2020/10xxx/CVE-2020-10781.json new file mode 100644 index 00000000000..8ccc65bc0a2 --- /dev/null +++ b/2020/10xxx/CVE-2020-10781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10782.json b/2020/10xxx/CVE-2020-10782.json new file mode 100644 index 00000000000..0e377bf4de4 --- /dev/null +++ b/2020/10xxx/CVE-2020-10782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10783.json b/2020/10xxx/CVE-2020-10783.json new file mode 100644 index 00000000000..b83ebc7cd3a --- /dev/null +++ b/2020/10xxx/CVE-2020-10783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10784.json b/2020/10xxx/CVE-2020-10784.json new file mode 100644 index 00000000000..deef4441e25 --- /dev/null +++ b/2020/10xxx/CVE-2020-10784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10785.json b/2020/10xxx/CVE-2020-10785.json new file mode 100644 index 00000000000..aa4bb313762 --- /dev/null +++ b/2020/10xxx/CVE-2020-10785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10786.json b/2020/10xxx/CVE-2020-10786.json new file mode 100644 index 00000000000..85b9d53bbe4 --- /dev/null +++ b/2020/10xxx/CVE-2020-10786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10787.json b/2020/10xxx/CVE-2020-10787.json new file mode 100644 index 00000000000..e8cc4aaef09 --- /dev/null +++ b/2020/10xxx/CVE-2020-10787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3950.json b/2020/3xxx/CVE-2020-3950.json index 0793643f42c..a1090217309 100644 --- a/2020/3xxx/CVE-2020-3950.json +++ b/2020/3xxx/CVE-2020-3950.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html" } ] },