From 5120cb65b8d5eaeca366d6f75319f505d192b3d2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 31 Jan 2020 04:01:17 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/17xxx/CVE-2019-17626.json | 5 +++ 2019/18xxx/CVE-2019-18913.json | 68 ++++++++++++++++++++++++++++++++++ 2020/5xxx/CVE-2020-5310.json | 5 +++ 2020/5xxx/CVE-2020-5311.json | 5 +++ 2020/5xxx/CVE-2020-5312.json | 5 +++ 2020/5xxx/CVE-2020-5313.json | 5 +++ 2020/5xxx/CVE-2020-5526.json | 11 ++++-- 2020/6xxx/CVE-2020-6851.json | 5 +++ 2020/8xxx/CVE-2020-8500.json | 18 +++++++++ 9 files changed, 124 insertions(+), 3 deletions(-) create mode 100644 2019/18xxx/CVE-2019-18913.json create mode 100644 2020/8xxx/CVE-2020-8500.json diff --git a/2019/17xxx/CVE-2019-17626.json b/2019/17xxx/CVE-2019-17626.json index 64932cf472c..26e7b66fde6 100644 --- a/2019/17xxx/CVE-2019-17626.json +++ b/2019/17xxx/CVE-2019-17626.json @@ -86,6 +86,11 @@ "refsource": "REDHAT", "name": "RHSA-2020:0201", "url": "https://access.redhat.com/errata/RHSA-2020:0201" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-f3e0ba2f79", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSCTOE3DITFICY2XKBYZ5WAF5TSQ52DM/" } ] } diff --git a/2019/18xxx/CVE-2019-18913.json b/2019/18xxx/CVE-2019-18913.json new file mode 100644 index 00000000000..1e81cea9f25 --- /dev/null +++ b/2019/18xxx/CVE-2019-18913.json @@ -0,0 +1,68 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-18913", + "ASSIGNER": "hp-security-alert@hp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HP Inc.", + "product": { + "product_data": [ + { + "product_name": "HP Intel-based Business PCs that support Microsoft Windows 10 Kernel DMA protection.", + "version": { + "version_data": [ + { + "version_value": "Depends on platform. Prior to 01.04.02" + }, + { + "version_value": "or prior to 02.04.01" + }, + { + "version_value": "or prior to 02.04.02." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Possible Arbitrary Code Execution, Denial of Service, Information Disclosure." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.hp.com/us-en/document/c06549501", + "url": "https://support.hp.com/us-en/document/c06549501" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A potential security vulnerability with pre-boot DMA may allow unauthorized UEFI code execution using open-case attacks. This industry-wide issue requires physically accessing internal expansion slots with specialized hardware and software tools to modify UEFI code in memory. This affects HP Intel-based Business PCs that support Microsoft Windows 10 Kernel DMA protection. Affected versions depend on platform (prior to 01.04.02; or prior to 02.04.01; or prior to 02.04.02)." + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5310.json b/2020/5xxx/CVE-2020-5310.json index ddeaa8f9f5b..c8d84edfe5e 100644 --- a/2020/5xxx/CVE-2020-5310.json +++ b/2020/5xxx/CVE-2020-5310.json @@ -61,6 +61,11 @@ "url": "https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4", "refsource": "MISC", "name": "https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-df444e464e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/" } ] } diff --git a/2020/5xxx/CVE-2020-5311.json b/2020/5xxx/CVE-2020-5311.json index d2e1af19d60..ed58e874c25 100644 --- a/2020/5xxx/CVE-2020-5311.json +++ b/2020/5xxx/CVE-2020-5311.json @@ -61,6 +61,11 @@ "url": "https://github.com/python-pillow/Pillow/commit/a79b65c47c7dc6fe623aadf09aa6192fc54548f3", "refsource": "MISC", "name": "https://github.com/python-pillow/Pillow/commit/a79b65c47c7dc6fe623aadf09aa6192fc54548f3" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-df444e464e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/" } ] } diff --git a/2020/5xxx/CVE-2020-5312.json b/2020/5xxx/CVE-2020-5312.json index 0ab4b21a4f9..283681bbaf2 100644 --- a/2020/5xxx/CVE-2020-5312.json +++ b/2020/5xxx/CVE-2020-5312.json @@ -61,6 +61,11 @@ "url": "https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd", "refsource": "MISC", "name": "https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-df444e464e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/" } ] } diff --git a/2020/5xxx/CVE-2020-5313.json b/2020/5xxx/CVE-2020-5313.json index d6a84643494..1e04e13eab3 100644 --- a/2020/5xxx/CVE-2020-5313.json +++ b/2020/5xxx/CVE-2020-5313.json @@ -61,6 +61,11 @@ "url": "https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b", "refsource": "MISC", "name": "https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-df444e464e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/" } ] } diff --git a/2020/5xxx/CVE-2020-5526.json b/2020/5xxx/CVE-2020-5526.json index 4a47b3c2384..f1faa073bd5 100644 --- a/2020/5xxx/CVE-2020-5526.json +++ b/2020/5xxx/CVE-2020-5526.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en" + "url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en", + "refsource": "MISC", + "name": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en" }, { - "url": "http://jvn.jp/en/jp/JVN00014057/index.html" + "url": "http://jvn.jp/en/jp/JVN00014057/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN00014057/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5526", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/6xxx/CVE-2020-6851.json b/2020/6xxx/CVE-2020-6851.json index a1f0d8d461f..3e43be8aa23 100644 --- a/2020/6xxx/CVE-2020-6851.json +++ b/2020/6xxx/CVE-2020-6851.json @@ -76,6 +76,11 @@ "refsource": "REDHAT", "name": "RHSA-2020:0296", "url": "https://access.redhat.com/errata/RHSA-2020:0296" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-ab8553f302", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBRMI2D3XPVWKE3V52KRBW7BJVLS5LD3/" } ] } diff --git a/2020/8xxx/CVE-2020-8500.json b/2020/8xxx/CVE-2020-8500.json new file mode 100644 index 00000000000..85601626869 --- /dev/null +++ b/2020/8xxx/CVE-2020-8500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file