From 3cad385ae6329ab4847a17084a2b75b6c7d46bdd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 3 Dec 2020 19:01:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/17xxx/CVE-2020-17527.json | 7 ++-- 2020/23xxx/CVE-2020-23736.json | 66 ++++++++++++++++++++++++++++--- 2020/23xxx/CVE-2020-23738.json | 66 ++++++++++++++++++++++++++++--- 2020/23xxx/CVE-2020-23740.json | 71 +++++++++++++++++++++++++++++++--- 2020/23xxx/CVE-2020-23741.json | 66 ++++++++++++++++++++++++++++--- 2020/2xxx/CVE-2020-2320.json | 5 +++ 2020/2xxx/CVE-2020-2321.json | 5 +++ 2020/2xxx/CVE-2020-2322.json | 5 +++ 2020/2xxx/CVE-2020-2323.json | 5 +++ 2020/2xxx/CVE-2020-2324.json | 5 +++ 10 files changed, 274 insertions(+), 27 deletions(-) diff --git a/2020/17xxx/CVE-2020-17527.json b/2020/17xxx/CVE-2020-17527.json index 8afd66ffc73..eb9e0ca125a 100644 --- a/2020/17xxx/CVE-2020-17527.json +++ b/2020/17xxx/CVE-2020-17527.json @@ -70,12 +70,13 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3E", + "name": "https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2020/23xxx/CVE-2020-23736.json b/2020/23xxx/CVE-2020-23736.json index 87325893eaf..74c1c12d7d7 100644 --- a/2020/23xxx/CVE-2020-23736.json +++ b/2020/23xxx/CVE-2020-23736.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23736", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23736", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a local denial of service vulnerability in DaDa accelerator 5.6.19.816,, attackers can use constructed programs to cause computer crashes (BSOD)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/y5s5k5/POCtemp5", + "refsource": "MISC", + "name": "https://github.com/y5s5k5/POCtemp5" + }, + { + "refsource": "MISC", + "name": "http://www.dadajiasu.net", + "url": "http://www.dadajiasu.net" + }, + { + "refsource": "MISC", + "name": "https://github.com/y5s5k5/CVE-2020-23736", + "url": "https://github.com/y5s5k5/CVE-2020-23736" } ] } diff --git a/2020/23xxx/CVE-2020-23738.json b/2020/23xxx/CVE-2020-23738.json index 2494553766a..baba807fc53 100644 --- a/2020/23xxx/CVE-2020-23738.json +++ b/2020/23xxx/CVE-2020-23738.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23738", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23738", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a local denial of service vulnerability in Advanced SystemCare 13 PRO 13.5.0.174. Attackers can use a constructed program to cause a computer crash (BSOD)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/y5s5k5/POCtemp6", + "refsource": "MISC", + "name": "https://github.com/y5s5k5/POCtemp6" + }, + { + "refsource": "MISC", + "name": "http://www.advancedsystemcare.cn", + "url": "http://www.advancedsystemcare.cn" + }, + { + "refsource": "MISC", + "name": "https://github.com/y5s5k5/CVE-2020-23738", + "url": "https://github.com/y5s5k5/CVE-2020-23738" } ] } diff --git a/2020/23xxx/CVE-2020-23740.json b/2020/23xxx/CVE-2020-23740.json index 90ba9ee72ce..33e3a6dda71 100644 --- a/2020/23xxx/CVE-2020-23740.json +++ b/2020/23xxx/CVE-2020-23740.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23740", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23740", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In DriverGenius 9.61.5480.28 there is a local privilege escalation vulnerability in the driver wizard, attackers can use constructed programs to increase user privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.drivergenius.com/", + "refsource": "MISC", + "name": "http://www.drivergenius.com/" + }, + { + "url": "https://github.com/y5s5k5/POCtemp8", + "refsource": "MISC", + "name": "https://github.com/y5s5k5/POCtemp8" + }, + { + "refsource": "MISC", + "name": "https://github.com/y5s5k5/CVE-2020-23740", + "url": "https://github.com/y5s5k5/CVE-2020-23740" + }, + { + "refsource": "MISC", + "name": "https://www.cnvd.org.cn/flaw/show/2438470", + "url": "https://www.cnvd.org.cn/flaw/show/2438470" } ] } diff --git a/2020/23xxx/CVE-2020-23741.json b/2020/23xxx/CVE-2020-23741.json index 7c83cbd0497..51a6f2cb88b 100644 --- a/2020/23xxx/CVE-2020-23741.json +++ b/2020/23xxx/CVE-2020-23741.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23741", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23741", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In AnyView (network police) network monitoring software 4.6.0.1, there is a local denial of service vulnerability in AnyView, attackers can use a constructed program to cause a computer crash (BSOD)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.amoisoft.com/", + "refsource": "MISC", + "name": "http://www.amoisoft.com/" + }, + { + "url": "https://github.com/y5s5k5/POCtemp9", + "refsource": "MISC", + "name": "https://github.com/y5s5k5/POCtemp9" + }, + { + "refsource": "MISC", + "name": "https://github.com/y5s5k5/CVE-2020-23741", + "url": "https://github.com/y5s5k5/CVE-2020-23741" } ] } diff --git a/2020/2xxx/CVE-2020-2320.json b/2020/2xxx/CVE-2020-2320.json index 590d6a7ae3a..3dff4d42309 100644 --- a/2020/2xxx/CVE-2020-2320.json +++ b/2020/2xxx/CVE-2020-2320.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-1856", "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-1856", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201203 Multiple vulnerabilities in Jenkins", + "url": "http://www.openwall.com/lists/oss-security/2020/12/03/2" } ] } diff --git a/2020/2xxx/CVE-2020-2321.json b/2020/2xxx/CVE-2020-2321.json index 5b17e09beed..4948b5ddef2 100644 --- a/2020/2xxx/CVE-2020-2321.json +++ b/2020/2xxx/CVE-2020-2321.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2108", "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2108", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201203 Multiple vulnerabilities in Jenkins", + "url": "http://www.openwall.com/lists/oss-security/2020/12/03/2" } ] } diff --git a/2020/2xxx/CVE-2020-2322.json b/2020/2xxx/CVE-2020-2322.json index d7b2a32b827..f6c0152d7e3 100644 --- a/2020/2xxx/CVE-2020-2322.json +++ b/2020/2xxx/CVE-2020-2322.json @@ -61,6 +61,11 @@ "name": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(1)", "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(1)", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201203 Multiple vulnerabilities in Jenkins", + "url": "http://www.openwall.com/lists/oss-security/2020/12/03/2" } ] } diff --git a/2020/2xxx/CVE-2020-2323.json b/2020/2xxx/CVE-2020-2323.json index 804ec90532e..9afae0178cf 100644 --- a/2020/2xxx/CVE-2020-2323.json +++ b/2020/2xxx/CVE-2020-2323.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(2)", "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(2)", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201203 Multiple vulnerabilities in Jenkins", + "url": "http://www.openwall.com/lists/oss-security/2020/12/03/2" } ] } diff --git a/2020/2xxx/CVE-2020-2324.json b/2020/2xxx/CVE-2020-2324.json index 3559c787e98..608e59c9372 100644 --- a/2020/2xxx/CVE-2020-2324.json +++ b/2020/2xxx/CVE-2020-2324.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2146", "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2146", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201203 Multiple vulnerabilities in Jenkins", + "url": "http://www.openwall.com/lists/oss-security/2020/12/03/2" } ] }