From 27d28ae94ac95ba51612c17a63259d5a25f10ebd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 5 Feb 2020 19:01:16 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2010/4xxx/CVE-2010-4662.json | 55 ++++++- 2010/4xxx/CVE-2010-4815.json | 60 +++++++- 2013/5xxx/CVE-2013-5989.json | 14 +- 2014/3xxx/CVE-2014-3893.json | 14 +- 2015/5xxx/CVE-2015-5626.json | 258 ++++++++++++++++++++++++++++++++- 2015/5xxx/CVE-2015-5627.json | 258 ++++++++++++++++++++++++++++++++- 2015/5xxx/CVE-2015-5628.json | 258 ++++++++++++++++++++++++++++++++- 2019/19xxx/CVE-2019-19948.json | 5 + 2019/19xxx/CVE-2019-19949.json | 5 + 2020/3xxx/CVE-2020-3110.json | 5 + 2020/3xxx/CVE-2020-3111.json | 5 + 2020/3xxx/CVE-2020-3118.json | 5 + 2020/3xxx/CVE-2020-3119.json | 5 + 2020/3xxx/CVE-2020-3120.json | 5 + 14 files changed, 923 insertions(+), 29 deletions(-) diff --git a/2010/4xxx/CVE-2010-4662.json b/2010/4xxx/CVE-2010-4662.json index b83f120b7fa..fbc188ae99b 100644 --- a/2010/4xxx/CVE-2010-4662.json +++ b/2010/4xxx/CVE-2010-4662.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4662", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "pmwiki", + "version": { + "version_data": [ + { + "version_value": "before 2.2.21" + } + ] + } + } + ] + }, + "vendor_name": "pmwiki" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PmWiki before 2.2.21 has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://packetstormsecurity.com/files/cve/CVE-2010-4662", + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/cve/CVE-2010-4662" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2011/02/23/23", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2011/02/23/23" } ] } diff --git a/2010/4xxx/CVE-2010-4815.json b/2010/4xxx/CVE-2010-4815.json index 625926c6813..e6cde4448c1 100644 --- a/2010/4xxx/CVE-2010-4815.json +++ b/2010/4xxx/CVE-2010-4815.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4815", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "coppermine gallery", + "version": { + "version_data": [ + { + "version_value": "before 1.4.26" + } + ] + } + } + ] + }, + "vendor_name": "coppermine gallery" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Coppermine gallery before 1.4.26 has an input validation vulnerability that allows for code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Other" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.openwall.com/lists/oss-security/2011/08/19/7", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2011/08/19/7" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/oss-sec/2010/q1/121", + "url": "https://seclists.org/oss-sec/2010/q1/121" + }, + { + "refsource": "MISC", + "name": "https://forum.coppermine-gallery.net/index.php/topic,63510.0.html", + "url": "https://forum.coppermine-gallery.net/index.php/topic,63510.0.html" } ] } diff --git a/2013/5xxx/CVE-2013-5989.json b/2013/5xxx/CVE-2013-5989.json index 531b8aa80dd..94fc2b81cb3 100644 --- a/2013/5xxx/CVE-2013-5989.json +++ b/2013/5xxx/CVE-2013-5989.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2013-5989", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2013-5989", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4969. Reason: This candidate is a duplicate of CVE-2011-4969. Notes: All CVE users should reference CVE-2011-4969 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2014/3xxx/CVE-2014-3893.json b/2014/3xxx/CVE-2014-3893.json index 07a3d1de1aa..3973160eb9c 100644 --- a/2014/3xxx/CVE-2014-3893.json +++ b/2014/3xxx/CVE-2014-3893.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2014-3893", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2014-3893", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0114. Reason: This candidate is a duplicate of CVE-2014-0114. Notes: All CVE users should reference CVE-2014-0114 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2015/5xxx/CVE-2015-5626.json b/2015/5xxx/CVE-2015-5626.json index bcfbd229f86..552b1c738ac 100644 --- a/2015/5xxx/CVE-2015-5626.json +++ b/2015/5xxx/CVE-2015-5626.json @@ -1,8 +1,8 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5626", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,259 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Overflow" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Yokogawa", + "product": { + "product_data": [ + { + "product_name": "CENTUM CS 1000", + "version": { + "version_data": [ + { + "version_value": "R3.08.70 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM CS 3000", + "version": { + "version_data": [ + { + "version_value": "R3.09.50 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM CS 3000 Entry", + "version": { + "version_data": [ + { + "version_value": "R3.09.50 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM VP", + "version": { + "version_data": [ + { + "version_value": "R5.04.20 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM VP Entry", + "version": { + "version_data": [ + { + "version_value": "R5.04.20 and earlier" + } + ] + } + }, + { + "product_name": "ProSafe-RS", + "version": { + "version_data": [ + { + "version_value": "R3.02.10 and earlier" + } + ] + } + }, + { + "product_name": "Exaopc", + "version": { + "version_data": [ + { + "version_value": "R3.72.00 and earlier" + } + ] + } + }, + { + "product_name": "Exaquantum", + "version": { + "version_data": [ + { + "version_value": "R2.85.00 and earlier" + } + ] + } + }, + { + "product_name": "Exaquantum/Batch", + "version": { + "version_data": [ + { + "version_value": "R2.50.30 and earlier" + } + ] + } + }, + { + "product_name": "Exapilot", + "version": { + "version_data": [ + { + "version_value": "R3.96.10 and earlier" + } + ] + } + }, + { + "product_name": "Exaplog", + "version": { + "version_data": [ + { + "version_value": "R3.40.00 and earlier" + } + ] + } + }, + { + "product_name": "Exasmoc", + "version": { + "version_data": [ + { + "version_value": "R4.03.20 and earlier" + } + ] + } + }, + { + "product_name": "Exarqe", + "version": { + "version_data": [ + { + "version_value": "R4.03.20 and earlier" + } + ] + } + }, + { + "product_name": "Field Wireless Device OPC Server", + "version": { + "version_data": [ + { + "version_value": "R2.01.02 and earlier" + } + ] + } + }, + { + "product_name": "PRM", + "version": { + "version_data": [ + { + "version_value": "R3.12.00 and earlier" + } + ] + } + }, + { + "product_name": "STARDOM VDS", + "version": { + "version_data": [ + { + "version_value": "R7.30.01 and earlier" + } + ] + } + }, + { + "product_name": "STARDOM OPC Server for Windows", + "version": { + "version_data": [ + { + "version_value": "R3.40 and earlier" + } + ] + } + }, + { + "product_name": "FAST/TOOLS", + "version": { + "version_data": [ + { + "version_value": "R10.01 and earlier" + } + ] + } + }, + { + "product_name": "B/M9000CS", + "version": { + "version_data": [ + { + "version_value": "R5.05.01 and earlier" + } + ] + } + }, + { + "product_name": "B/M9000 VP", + "version": { + "version_data": [ + { + "version_value": "R7.03.04 and earlier" + } + ] + } + }, + { + "product_name": "FieldMate", + "version": { + "version_data": [ + { + "version_value": "R1.01" + }, + { + "version_value": "R1.02" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" + }, + { + "refsource": "CONFIRM", + "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", + "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } diff --git a/2015/5xxx/CVE-2015-5627.json b/2015/5xxx/CVE-2015-5627.json index 8a2c27c76ee..67034ef8a21 100644 --- a/2015/5xxx/CVE-2015-5627.json +++ b/2015/5xxx/CVE-2015-5627.json @@ -1,8 +1,8 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5627", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,259 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Overflow" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Yokogawa", + "product": { + "product_data": [ + { + "product_name": "CENTUM CS 1000", + "version": { + "version_data": [ + { + "version_value": "R3.08.70 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM CS 3000", + "version": { + "version_data": [ + { + "version_value": "R3.09.50 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM CS 3000 Entry", + "version": { + "version_data": [ + { + "version_value": "R3.09.50 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM VP", + "version": { + "version_data": [ + { + "version_value": "R5.04.20 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM VP Entry", + "version": { + "version_data": [ + { + "version_value": "R5.04.20 and earlier" + } + ] + } + }, + { + "product_name": "ProSafe-RS", + "version": { + "version_data": [ + { + "version_value": "R3.02.10 and earlier" + } + ] + } + }, + { + "product_name": "Exaopc", + "version": { + "version_data": [ + { + "version_value": "R3.72.00 and earlier" + } + ] + } + }, + { + "product_name": "Exaquantum", + "version": { + "version_data": [ + { + "version_value": "R2.85.00 and earlier" + } + ] + } + }, + { + "product_name": "Exaquantum/Batch", + "version": { + "version_data": [ + { + "version_value": "R2.50.30 and earlier" + } + ] + } + }, + { + "product_name": "Exapilot", + "version": { + "version_data": [ + { + "version_value": "R3.96.10 and earlier" + } + ] + } + }, + { + "product_name": "Exaplog", + "version": { + "version_data": [ + { + "version_value": "R3.40.00 and earlier" + } + ] + } + }, + { + "product_name": "Exasmoc", + "version": { + "version_data": [ + { + "version_value": "R4.03.20 and earlier" + } + ] + } + }, + { + "product_name": "Exarqe", + "version": { + "version_data": [ + { + "version_value": "R4.03.20 and earlier" + } + ] + } + }, + { + "product_name": "Field Wireless Device OPC Server", + "version": { + "version_data": [ + { + "version_value": "R2.01.02 and earlier" + } + ] + } + }, + { + "product_name": "PRM", + "version": { + "version_data": [ + { + "version_value": "R3.12.00 and earlier" + } + ] + } + }, + { + "product_name": "STARDOM VDS", + "version": { + "version_data": [ + { + "version_value": "R7.30.01 and earlier" + } + ] + } + }, + { + "product_name": "STARDOM OPC Server for Windows", + "version": { + "version_data": [ + { + "version_value": "R3.40 and earlier" + } + ] + } + }, + { + "product_name": "FAST/TOOLS", + "version": { + "version_data": [ + { + "version_value": "R10.01 and earlier" + } + ] + } + }, + { + "product_name": "B/M9000CS", + "version": { + "version_data": [ + { + "version_value": "R5.05.01 and earlier" + } + ] + } + }, + { + "product_name": "B/M9000 VP", + "version": { + "version_data": [ + { + "version_value": "R7.03.04 and earlier" + } + ] + } + }, + { + "product_name": "FieldMate", + "version": { + "version_data": [ + { + "version_value": "R1.01" + }, + { + "version_value": "R1.02" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" + }, + { + "refsource": "CONFIRM", + "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", + "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } diff --git a/2015/5xxx/CVE-2015-5628.json b/2015/5xxx/CVE-2015-5628.json index 0184fed413a..c6d5addbc68 100644 --- a/2015/5xxx/CVE-2015-5628.json +++ b/2015/5xxx/CVE-2015-5628.json @@ -1,8 +1,8 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5628", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,259 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Overflow" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Yokogawa", + "product": { + "product_data": [ + { + "product_name": "CENTUM CS 1000", + "version": { + "version_data": [ + { + "version_value": "R3.08.70 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM CS 3000", + "version": { + "version_data": [ + { + "version_value": "R3.09.50 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM CS 3000 Entry", + "version": { + "version_data": [ + { + "version_value": "R3.09.50 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM VP", + "version": { + "version_data": [ + { + "version_value": "R5.04.20 and earlier" + } + ] + } + }, + { + "product_name": "CENTUM VP Entry", + "version": { + "version_data": [ + { + "version_value": "R5.04.20 and earlier" + } + ] + } + }, + { + "product_name": "ProSafe-RS", + "version": { + "version_data": [ + { + "version_value": "R3.02.10 and earlier" + } + ] + } + }, + { + "product_name": "Exaopc", + "version": { + "version_data": [ + { + "version_value": "R3.72.00 and earlier" + } + ] + } + }, + { + "product_name": "Exaquantum", + "version": { + "version_data": [ + { + "version_value": "R2.85.00 and earlier" + } + ] + } + }, + { + "product_name": "Exaquantum/Batch", + "version": { + "version_data": [ + { + "version_value": "R2.50.30 and earlier" + } + ] + } + }, + { + "product_name": "Exapilot", + "version": { + "version_data": [ + { + "version_value": "R3.96.10 and earlier" + } + ] + } + }, + { + "product_name": "Exaplog", + "version": { + "version_data": [ + { + "version_value": "R3.40.00 and earlier" + } + ] + } + }, + { + "product_name": "Exasmoc", + "version": { + "version_data": [ + { + "version_value": "R4.03.20 and earlier" + } + ] + } + }, + { + "product_name": "Exarqe", + "version": { + "version_data": [ + { + "version_value": "R4.03.20 and earlier" + } + ] + } + }, + { + "product_name": "Field Wireless Device OPC Server", + "version": { + "version_data": [ + { + "version_value": "R2.01.02 and earlier" + } + ] + } + }, + { + "product_name": "PRM", + "version": { + "version_data": [ + { + "version_value": "R3.12.00 and earlier" + } + ] + } + }, + { + "product_name": "STARDOM VDS", + "version": { + "version_data": [ + { + "version_value": "R7.30.01 and earlier" + } + ] + } + }, + { + "product_name": "STARDOM OPC Server for Windows", + "version": { + "version_data": [ + { + "version_value": "R3.40 and earlier" + } + ] + } + }, + { + "product_name": "FAST/TOOLS", + "version": { + "version_data": [ + { + "version_value": "R10.01 and earlier" + } + ] + } + }, + { + "product_name": "B/M9000CS", + "version": { + "version_data": [ + { + "version_value": "R5.05.01 and earlier" + } + ] + } + }, + { + "product_name": "B/M9000 VP", + "version": { + "version_data": [ + { + "version_value": "R7.03.04 and earlier" + } + ] + } + }, + { + "product_name": "FieldMate", + "version": { + "version_data": [ + { + "version_value": "R1.01" + }, + { + "version_value": "R1.02" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" + }, + { + "refsource": "CONFIRM", + "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", + "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } diff --git a/2019/19xxx/CVE-2019-19948.json b/2019/19xxx/CVE-2019-19948.json index 379f092327b..b566d55f853 100644 --- a/2019/19xxx/CVE-2019-19948.json +++ b/2019/19xxx/CVE-2019-19948.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20191229 [SECURITY] [DLA 2049-1] imagemagick security update", "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00033.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:0170", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" } ] } diff --git a/2019/19xxx/CVE-2019-19949.json b/2019/19xxx/CVE-2019-19949.json index 56c5a755377..8f52edcde53 100644 --- a/2019/19xxx/CVE-2019-19949.json +++ b/2019/19xxx/CVE-2019-19949.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20191229 [SECURITY] [DLA 2049-1] imagemagick security update", "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00033.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:0170", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" } ] } diff --git a/2020/3xxx/CVE-2020-3110.json b/2020/3xxx/CVE-2020-3110.json index 02dee9ef60d..b2a6c4b8fea 100644 --- a/2020/3xxx/CVE-2020-3110.json +++ b/2020/3xxx/CVE-2020-3110.json @@ -72,6 +72,11 @@ "name": "20200205 Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-ipcameras-rce-dos" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", + "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ] }, diff --git a/2020/3xxx/CVE-2020-3111.json b/2020/3xxx/CVE-2020-3111.json index c7a218fc1f9..f48d6229afe 100644 --- a/2020/3xxx/CVE-2020-3111.json +++ b/2020/3xxx/CVE-2020-3111.json @@ -72,6 +72,11 @@ "name": "20200205 Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", + "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ] }, diff --git a/2020/3xxx/CVE-2020-3118.json b/2020/3xxx/CVE-2020-3118.json index bb645f7e726..05d2b90a0ef 100644 --- a/2020/3xxx/CVE-2020-3118.json +++ b/2020/3xxx/CVE-2020-3118.json @@ -72,6 +72,11 @@ "name": "20200205 Cisco IOS XR Software Cisco Discovery Protocol Format String Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-iosxr-cdp-rce" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", + "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ] }, diff --git a/2020/3xxx/CVE-2020-3119.json b/2020/3xxx/CVE-2020-3119.json index 4fc019fa555..fba6f236126 100644 --- a/2020/3xxx/CVE-2020-3119.json +++ b/2020/3xxx/CVE-2020-3119.json @@ -72,6 +72,11 @@ "name": "20200205 Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", + "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ] }, diff --git a/2020/3xxx/CVE-2020-3120.json b/2020/3xxx/CVE-2020-3120.json index 7073eb5a953..ada6a8f1cce 100644 --- a/2020/3xxx/CVE-2020-3120.json +++ b/2020/3xxx/CVE-2020-3120.json @@ -72,6 +72,11 @@ "name": "20200205 Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-fxnxos-iosxr-cdp-dos" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", + "url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html" } ] },