"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-04-22 20:01:22 +00:00
parent aaf188dbc0
commit 66306b3d74
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
19 changed files with 365 additions and 35 deletions

View File

@ -1,18 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-21150",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2018-21150",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.50, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://kb.netgear.com/000059483/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3155",
"url": "https://kb.netgear.com/000059483/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3155"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:U/UI:N",
"version": "3.0"
}
}
}

View File

@ -1,18 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-21151",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2018-21151",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.54, and WNDR4500v3 before 1.0.0.54."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://kb.netgear.com/000059482/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3154",
"url": "https://kb.netgear.com/000059482/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3154"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:U/UI:N",
"version": "3.0"
}
}
}

View File

@ -166,6 +166,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-39e0b8bd14",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-11505",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-11505",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) before 12.7.9, 12.8.x before 12.8.9, and 12.9.x before 12.9.3. A Workhorse bypass could lead to NuGet package and file disclosure (Exposure of Sensitive Information) via request smuggling."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://about.gitlab.com/blog/categories/releases/",
"refsource": "MISC",
"name": "https://about.gitlab.com/blog/categories/releases/"
},
{
"refsource": "CONFIRM",
"name": "https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/",
"url": "https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-11506",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-11506",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in GitLab 10.7.0 and later through 12.9.2. A Workhorse bypass could lead to job artifact uploads and file disclosure (Exposure of Sensitive Information) via request smuggling."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://about.gitlab.com/blog/categories/releases/",
"refsource": "MISC",
"name": "https://about.gitlab.com/blog/categories/releases/"
},
{
"refsource": "CONFIRM",
"name": "https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/",
"url": "https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-11649",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-11649",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in GitLab CE and EE 8.15 through 12.9.2. Members of a group could still have access after the group is deleted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://about.gitlab.com/blog/categories/releases/",
"refsource": "MISC",
"name": "https://about.gitlab.com/blog/categories/releases/"
},
{
"refsource": "CONFIRM",
"name": "https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/",
"url": "https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/"
}
]
}

View File

@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.\n\n"
"value": "A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service."
}
]
},
@ -87,12 +87,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20"
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20",
"name": "https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20"
},
{
"refsource": "CONFIRM",
"url": "https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04"
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04",
"name": "https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04"
}
]
},

View File

@ -59,6 +59,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-10",
"url": "https://security.gentoo.org/glsa/202003-10"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -59,6 +59,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-10",
"url": "https://security.gentoo.org/glsa/202003-10"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -59,6 +59,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-10",
"url": "https://security.gentoo.org/glsa/202003-10"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -59,6 +59,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-10",
"url": "https://security.gentoo.org/glsa/202003-10"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-10",
"url": "https://security.gentoo.org/glsa/202003-10"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-10",
"url": "https://security.gentoo.org/glsa/202003-10"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -90,6 +90,11 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1610880",
"refsource": "MISC",
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1610880"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -90,6 +90,11 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1612308",
"refsource": "MISC",
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1612308"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -90,6 +90,11 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1614971",
"refsource": "MISC",
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1614971"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -90,6 +90,11 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1607742",
"refsource": "MISC",
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1607742"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -90,6 +90,11 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1616661",
"refsource": "MISC",
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1616661"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},

View File

@ -90,6 +90,11 @@
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339",
"refsource": "MISC",
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339"
},
{
"refsource": "UBUNTU",
"name": "USN-4328-1",
"url": "https://usn.ubuntu.com/4328-1/"
}
]
},