From 5697893cda8644917bd5c8f61d6e1c242821445b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 24 Apr 2020 00:01:27 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15791.json | 15 +++++--- 2019/15xxx/CVE-2019-15792.json | 17 +++++---- 2019/15xxx/CVE-2019-15793.json | 15 +++++--- 2019/15xxx/CVE-2019-15794.json | 22 ++++++----- 2020/12xxx/CVE-2020-12128.json | 62 +++++++++++++++++++++++++++++++ 2020/12xxx/CVE-2020-12129.json | 62 +++++++++++++++++++++++++++++++ 2020/12xxx/CVE-2020-12130.json | 62 +++++++++++++++++++++++++++++++ 2020/12xxx/CVE-2020-12131.json | 62 +++++++++++++++++++++++++++++++ 2020/12xxx/CVE-2020-12132.json | 67 ++++++++++++++++++++++++++++++++++ 2020/12xxx/CVE-2020-12133.json | 18 +++++++++ 10 files changed, 374 insertions(+), 28 deletions(-) create mode 100644 2020/12xxx/CVE-2020-12128.json create mode 100644 2020/12xxx/CVE-2020-12129.json create mode 100644 2020/12xxx/CVE-2020-12130.json create mode 100644 2020/12xxx/CVE-2020-12131.json create mode 100644 2020/12xxx/CVE-2020-12132.json create mode 100644 2020/12xxx/CVE-2020-12133.json diff --git a/2019/15xxx/CVE-2019-15791.json b/2019/15xxx/CVE-2019-15791.json index 5ad962e0384..1147abe8f6c 100644 --- a/2019/15xxx/CVE-2019-15791.json +++ b/2019/15xxx/CVE-2019-15791.json @@ -92,16 +92,19 @@ "references": { "reference_data": [ { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4183-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4183-1", + "name": "https://usn.ubuntu.com/usn/usn-4183-1" }, { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4184-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4184-1", + "name": "https://usn.ubuntu.com/usn/usn-4184-1" }, { - "refsource": "CONFIRM", - "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=601a64857b3d7040ca15c39c929e6b9db3373ec1" + "refsource": "MISC", + "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=601a64857b3d7040ca15c39c929e6b9db3373ec1", + "name": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=601a64857b3d7040ca15c39c929e6b9db3373ec1" } ] }, diff --git a/2019/15xxx/CVE-2019-15792.json b/2019/15xxx/CVE-2019-15792.json index 11395228c92..6f4d2f96c91 100644 --- a/2019/15xxx/CVE-2019-15792.json +++ b/2019/15xxx/CVE-2019-15792.json @@ -92,16 +92,19 @@ "references": { "reference_data": [ { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4183-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4183-1", + "name": "https://usn.ubuntu.com/usn/usn-4183-1" }, { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4184-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4184-1", + "name": "https://usn.ubuntu.com/usn/usn-4184-1" }, { - "refsource": "CONFIRM", - "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=5df147c8140efc71ac0879ae3b0057f577226d4c" + "refsource": "MISC", + "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=5df147c8140efc71ac0879ae3b0057f577226d4c", + "name": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=5df147c8140efc71ac0879ae3b0057f577226d4c" } ] }, @@ -111,4 +114,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15793.json b/2019/15xxx/CVE-2019-15793.json index 65c27264085..bb65d6341fe 100644 --- a/2019/15xxx/CVE-2019-15793.json +++ b/2019/15xxx/CVE-2019-15793.json @@ -92,16 +92,19 @@ "references": { "reference_data": [ { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4183-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4183-1", + "name": "https://usn.ubuntu.com/usn/usn-4183-1" }, { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4184-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4184-1", + "name": "https://usn.ubuntu.com/usn/usn-4184-1" }, { - "refsource": "CONFIRM", - "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=3644b9d5688da86f18e017c9c580b75cf52927bb" + "refsource": "MISC", + "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=3644b9d5688da86f18e017c9c580b75cf52927bb", + "name": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=3644b9d5688da86f18e017c9c580b75cf52927bb" } ] }, diff --git a/2019/15xxx/CVE-2019-15794.json b/2019/15xxx/CVE-2019-15794.json index 88543b07d98..3e4779051d0 100644 --- a/2019/15xxx/CVE-2019-15794.json +++ b/2019/15xxx/CVE-2019-15794.json @@ -87,20 +87,24 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635" + "refsource": "MISC", + "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635", + "name": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635" }, { - "refsource": "CONFIRM", - "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3" + "refsource": "MISC", + "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3", + "name": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3" }, { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4208-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4208-1", + "name": "https://usn.ubuntu.com/usn/usn-4208-1" }, { - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/usn/usn-4209-1" + "refsource": "MISC", + "url": "https://usn.ubuntu.com/usn/usn-4209-1", + "name": "https://usn.ubuntu.com/usn/usn-4209-1" } ] }, @@ -110,4 +114,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12128.json b/2020/12xxx/CVE-2020-12128.json new file mode 100644 index 00000000000..9f6c224b4a3 --- /dev/null +++ b/2020/12xxx/CVE-2020-12128.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-12128", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "DONG JOO CHO File Transfer iFamily 2.1 allows directory traversal related to the ./etc/ path." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.vulnerability-lab.com/get_content.php?id=2199", + "refsource": "MISC", + "name": "https://www.vulnerability-lab.com/get_content.php?id=2199" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12129.json b/2020/12xxx/CVE-2020-12129.json new file mode 100644 index 00000000000..1defe9a9912 --- /dev/null +++ b/2020/12xxx/CVE-2020-12129.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-12129", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The AirDisk Pro app 5.5.3 for iOS allows XSS via the createFolder parameter of the Create Folder function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.vulnerability-lab.com/get_content.php?id=2203", + "refsource": "MISC", + "name": "https://www.vulnerability-lab.com/get_content.php?id=2203" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12130.json b/2020/12xxx/CVE-2020-12130.json new file mode 100644 index 00000000000..800ea8d21d5 --- /dev/null +++ b/2020/12xxx/CVE-2020-12130.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-12130", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The AirDisk Pro app 5.5.3 for iOS allows XSS via the deleteFile parameter of the Delete function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.vulnerability-lab.com/get_content.php?id=2203", + "refsource": "MISC", + "name": "https://www.vulnerability-lab.com/get_content.php?id=2203" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12131.json b/2020/12xxx/CVE-2020-12131.json new file mode 100644 index 00000000000..3b4a8d6b557 --- /dev/null +++ b/2020/12xxx/CVE-2020-12131.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-12131", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The AirDisk Pro app 5.5.3 for iOS allows XSS via the devicename parameter (shown next to the UI logo)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.vulnerability-lab.com/get_content.php?id=2203", + "refsource": "MISC", + "name": "https://www.vulnerability-lab.com/get_content.php?id=2203" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12132.json b/2020/12xxx/CVE-2020-12132.json new file mode 100644 index 00000000000..843cd6e7f11 --- /dev/null +++ b/2020/12xxx/CVE-2020-12132.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-12132", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Fifthplay S.A.M.I before 2019.3_HP2 allows unauthenticated stored XSS via a POST request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fifthplay.com/faq/", + "refsource": "MISC", + "name": "https://www.fifthplay.com/faq/" + }, + { + "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5561.php", + "refsource": "MISC", + "name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5561.php" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12133.json b/2020/12xxx/CVE-2020-12133.json new file mode 100644 index 00000000000..b181f1028c9 --- /dev/null +++ b/2020/12xxx/CVE-2020-12133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file