From 7fda125e3a9e8720475f280cb58ccc420cea868e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 30 Jun 2020 11:01:27 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/18xxx/CVE-2017-18922.json | 72 ++++++++++++++++++++++++++++++++++ 2020/15xxx/CVE-2020-15395.json | 67 +++++++++++++++++++++++++++++++ 2020/5xxx/CVE-2020-5580.json | 13 ++++-- 2020/5xxx/CVE-2020-5581.json | 11 ++++-- 2020/5xxx/CVE-2020-5582.json | 11 ++++-- 2020/5xxx/CVE-2020-5583.json | 11 ++++-- 2020/5xxx/CVE-2020-5584.json | 11 ++++-- 2020/5xxx/CVE-2020-5585.json | 11 ++++-- 2020/5xxx/CVE-2020-5586.json | 11 ++++-- 2020/5xxx/CVE-2020-5587.json | 11 ++++-- 2020/5xxx/CVE-2020-5588.json | 11 ++++-- 2020/5xxx/CVE-2020-5601.json | 11 ++++-- 2020/5xxx/CVE-2020-5602.json | 11 ++++-- 2020/5xxx/CVE-2020-5603.json | 11 ++++-- 14 files changed, 236 insertions(+), 37 deletions(-) create mode 100644 2017/18xxx/CVE-2017-18922.json create mode 100644 2020/15xxx/CVE-2020-15395.json diff --git a/2017/18xxx/CVE-2017-18922.json b/2017/18xxx/CVE-2017-18922.json new file mode 100644 index 00000000000..661d421ff5a --- /dev/null +++ b/2017/18xxx/CVE-2017-18922.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18922", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433", + "refsource": "MISC", + "name": "https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2020/06/30/2", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2020/06/30/2" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852356", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1852356" + } + ] + } +} \ No newline at end of file diff --git a/2020/15xxx/CVE-2020-15395.json b/2020/15xxx/CVE-2020-15395.json new file mode 100644 index 00000000000..4524a718a7c --- /dev/null +++ b/2020/15xxx/CVE-2020-15395.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-15395", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In MediaInfoLib in MediaArea MediaInfo 20.03, there is a stack-based buffer over-read in Streams_Fill_PerStream in Multiple/File_MpegPs.cpp (aka an off-by-one during MpegPs parsing)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sourceforge.net/p/mediainfo/bugs/1127/", + "refsource": "MISC", + "name": "https://sourceforge.net/p/mediainfo/bugs/1127/" + }, + { + "url": "https://mediaarea.net/en/MediaInfo", + "refsource": "MISC", + "name": "https://mediaarea.net/en/MediaInfo" + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5580.json b/2020/5xxx/CVE-2020-5580.json index d0a78477611..858fd9064a7 100644 --- a/2020/5xxx/CVE-2020-5580.json +++ b/2020/5xxx/CVE-2020-5580.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36391" + "url": "https://kb.cybozu.support/article/36391", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36391" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" } ] }, @@ -14,7 +18,7 @@ "description_data": [ { "lang": "eng", - "value": "Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to bypass access restriction to view and/or alter Single sign-on settings via unspecified vectors." + "value": "Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to bypass access restriction to view and/or alter Single sign-on settings via unspecified vectors." } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5580", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5581.json b/2020/5xxx/CVE-2020-5581.json index 320cad43fa4..7e2673fb786 100644 --- a/2020/5xxx/CVE-2020-5581.json +++ b/2020/5xxx/CVE-2020-5581.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36393" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36393", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36393" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5581", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5582.json b/2020/5xxx/CVE-2020-5582.json index 005c1b31d2c..99a59028e73 100644 --- a/2020/5xxx/CVE-2020-5582.json +++ b/2020/5xxx/CVE-2020-5582.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36455/" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36455/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36455/" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5582", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5583.json b/2020/5xxx/CVE-2020-5583.json index 28ec70fa84b..b3a183fb199 100644 --- a/2020/5xxx/CVE-2020-5583.json +++ b/2020/5xxx/CVE-2020-5583.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36408/" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36408/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36408/" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5583", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5584.json b/2020/5xxx/CVE-2020-5584.json index 16d4a4da4e5..d9ff9e7525b 100644 --- a/2020/5xxx/CVE-2020-5584.json +++ b/2020/5xxx/CVE-2020-5584.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36433/" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36433/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36433/" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5584", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5585.json b/2020/5xxx/CVE-2020-5585.json index 92efa0b617b..ac89a604696 100644 --- a/2020/5xxx/CVE-2020-5585.json +++ b/2020/5xxx/CVE-2020-5585.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36432/" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36432/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36432/" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5585", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5586.json b/2020/5xxx/CVE-2020-5586.json index 0784eca336a..00007f3e580 100644 --- a/2020/5xxx/CVE-2020-5586.json +++ b/2020/5xxx/CVE-2020-5586.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36453/" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36453/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36453/" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5586", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5587.json b/2020/5xxx/CVE-2020-5587.json index 6ef37a41276..e03fbf04003 100644 --- a/2020/5xxx/CVE-2020-5587.json +++ b/2020/5xxx/CVE-2020-5587.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36409/" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36409/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36409/" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5587", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5588.json b/2020/5xxx/CVE-2020-5588.json index be179930555..1054c7b385c 100644 --- a/2020/5xxx/CVE-2020-5588.json +++ b/2020/5xxx/CVE-2020-5588.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36410/" + "url": "https://jvn.jp/en/jp/JVN55497111/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN55497111/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN55497111/index.html" + "url": "https://kb.cybozu.support/article/36410/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36410/" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5588", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5601.json b/2020/5xxx/CVE-2020-5601.json index b84d1893f53..b09b181abbe 100644 --- a/2020/5xxx/CVE-2020-5601.json +++ b/2020/5xxx/CVE-2020-5601.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.e-tax.nta.go.jp/topics/topics_200618.htm" + "url": "https://www.e-tax.nta.go.jp/topics/topics_200618.htm", + "refsource": "MISC", + "name": "https://www.e-tax.nta.go.jp/topics/topics_200618.htm" }, { - "url": "https://jvn.jp/en/jp/JVN40039627/index.html" + "url": "https://jvn.jp/en/jp/JVN40039627/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN40039627/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5601", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5602.json b/2020/5xxx/CVE-2020-5602.json index 0d6a987e12e..9fa99904fbe 100644 --- a/2020/5xxx/CVE-2020-5602.json +++ b/2020/5xxx/CVE-2020-5602.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf" }, { - "url": "https://jvn.jp/en/vu/JVNVU90307594/index.html" + "url": "https://jvn.jp/en/vu/JVNVU90307594/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU90307594/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5602", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5603.json b/2020/5xxx/CVE-2020-5603.json index 151a7cc5b95..c83cf87704a 100644 --- a/2020/5xxx/CVE-2020-5603.json +++ b/2020/5xxx/CVE-2020-5603.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf" }, { - "url": "https://jvn.jp/en/vu/JVNVU90307594/index.html" + "url": "https://jvn.jp/en/vu/JVNVU90307594/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU90307594/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5603", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": {