Auto-merge PR#3465

Auto-merge PR#3465
This commit is contained in:
CVE Team 2020-03-24 21:25:37 -04:00 committed by GitHub
commit 3dba33ddec
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 480 additions and 70 deletions

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5552",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN85942151/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-site scripting vulnerability in mailform version 1.04 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "version 1.04"
}
]
},
"product_name": "mailform"
}
]
},
"vendor_name": "keitai-site.net"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5552",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5553",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN77634892/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "mailform version 1.04 allows remote attackers to execute arbitrary PHP code via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "version 1.04"
}
]
},
"product_name": "mailform"
}
]
},
"vendor_name": "keitai-site.net"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5553",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote code execution"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5554",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN32415420/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Directory traversal vulnerability in Shihonkanri Plus GOOUT Ver1.5.8 and Ver2.2.10 allows remote attackers to read and write arbitrary files via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "Ver1.5.8 and Ver2.2.10"
}
]
},
"product_name": "Shihonkanri Plus GOOUT"
}
]
},
"vendor_name": "EKAKIN"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5554",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Directory traversal"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5555",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN32415420/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Shihonkanri Plus GOOUT Ver1.5.8 and Ver2.2.10 allows remote attackers to read and write data of the files placed in the same directory where it is placed via unspecified vector due to the improper input validation issue."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "Ver1.5.8 and Ver2.2.10"
}
]
},
"product_name": "Shihonkanri Plus GOOUT"
}
]
},
"vendor_name": "EKAKIN"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5555",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Input Validation"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5556",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN63834780/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Shihonkanri Plus GOOUT Ver1.5.8 and Ver2.2.10 allows remote attackers to execute arbitrary OS commands via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "Ver1.5.8 and Ver2.2.10"
}
]
},
"product_name": "Shihonkanri Plus GOOUT"
}
]
},
"vendor_name": "EKAKIN"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5556",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5557",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN29095127/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-site scripting vulnerability in CuteNews 2.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "2.0.1"
}
]
},
"product_name": "CuteNews"
}
]
},
"vendor_name": "CutePHP.com"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5557",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5558",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN58176087/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "CuteNews 2.0.1 allows remote authenticated attackers to execute arbitrary PHP code via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "2.0.1"
}
]
},
"product_name": "CuteNews"
}
]
},
"vendor_name": "CutePHP.com"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5558",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote code execution"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5559",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN88033799/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-site scripting vulnerability in WL-Enq 1.11 and 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "1.11 and 1.12"
}
]
},
"product_name": "WL-Enq"
}
]
},
"vendor_name": "WonderLink"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5559",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5560",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN27951364/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "WL-Enq 1.11 and 1.12 allows remote attackers to execute arbitrary OS commands with the administrative privilege via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "1.11 and 1.12"
}
]
},
"product_name": "WL-Enq"
}
]
},
"vendor_name": "WonderLink"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5560",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
}

View File

@ -1,17 +1,58 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5561",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN88277644/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Keijiban Tsumiki v1.15 allows remote attackers to execute arbitrary OS commands via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "v1.15"
}
]
},
"product_name": "Keijiban Tsumiki"
}
]
},
"vendor_name": "Mash room - Free CGI -"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5561",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
}