"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-05-18 05:01:17 +00:00
parent 9341669fae
commit 539b64309d
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
26 changed files with 385 additions and 30 deletions

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://arxiv.org/abs/2005.01783",
"url": "https://arxiv.org/abs/2005.01783"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0006/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0006/"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:14.sctp.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:14.sctp.asc"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0007/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0007/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:15.cryptodev.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:15.cryptodev.asc"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0005/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0008/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0008/"
}
]
},

View File

@ -91,6 +91,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-f9a598f815",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BL5YCZXYS67MLJSHR4OLSWVHBE6PZJSB/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-fb5af97476",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMPZ7XPOPA4JGAQAUJ4K7JV653DSCIDK/"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "CONFIRM",
"name": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658",
"url": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0002/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0002/"
}
]
}

View File

@ -66,6 +66,11 @@
"url": "https://libvirt.org/git/?p=libvirt.git;a=commit;h=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581",
"refsource": "MISC",
"name": "https://libvirt.org/git/?p=libvirt.git;a=commit;h=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0003/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0003/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-c6b0c7ebbb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0001/"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-c6b0c7ebbb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0004/"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-12857",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-12857",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Caching of GATT characteristic values (TempID) in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to long-term re-identify an Android device running COVIDSafe."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app",
"refsource": "MISC",
"name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app"
},
{
"url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing"
},
{
"refsource": "MISC",
"name": "https://covidsafe.watch/issue-register/cve-2020-12857-tempid-identifier-was-static",
"url": "https://covidsafe.watch/issue-register/cve-2020-12857-tempid-identifier-was-static"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-12858",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-12858",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to re-identify Android devices running COVIDSafe by scanning for their advertising beacons."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app",
"refsource": "MISC",
"name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app"
},
{
"url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-12859",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-12859",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote attacker to identify a device model by observing cleartext payload data. This allows re-identification of devices, especially less common phone models or those in low-density situations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app",
"refsource": "MISC",
"name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app"
},
{
"url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-12860",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-12860",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "COVIDSafe through v1.0.17 allows a remote attacker to access phone name and model information because a BLE device can have four roles and COVIDSafe uses all of them. This allows for re-identification of a device, and potentially identification of the owner's name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app",
"refsource": "MISC",
"name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app"
},
{
"url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13129",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-13129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in the stashcat app through 3.9.1 for macOS. The GET method is used with client_key and device_id data in the query string, which allows attackers to obtain sensitive information by reading web-server logs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.jvanlaak.de/stashcat.html",
"refsource": "MISC",
"name": "https://www.jvanlaak.de/stashcat.html"
},
{
"url": "https://www.jvanlaak.de/stashcat_CWE_598_205017.pdf",
"refsource": "MISC",
"name": "https://www.jvanlaak.de/stashcat_CWE_598_205017.pdf"
}
]
}

View File

@ -98,6 +98,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -98,6 +98,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -98,6 +98,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-21ca991b3b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-a60ad9d4ec",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:12.libalias.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:12.libalias.asc"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0005/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:13.libalias.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:13.libalias.asc"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0005/"
}
]
},