From 8f701c85c9bc6930836a94b98c292b68ae0164fe Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 14 May 2020 14:01:16 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15083.json | 67 ++++++++++++++++++++++++++++++++++ 2020/12xxx/CVE-2020-12845.json | 18 +++++++++ 2020/12xxx/CVE-2020-12846.json | 18 +++++++++ 2020/12xxx/CVE-2020-12847.json | 18 +++++++++ 2020/12xxx/CVE-2020-12848.json | 18 +++++++++ 2020/12xxx/CVE-2020-12849.json | 18 +++++++++ 2020/12xxx/CVE-2020-12850.json | 18 +++++++++ 2020/12xxx/CVE-2020-12851.json | 18 +++++++++ 2020/12xxx/CVE-2020-12852.json | 18 +++++++++ 2020/12xxx/CVE-2020-12853.json | 18 +++++++++ 10 files changed, 229 insertions(+) create mode 100644 2019/15xxx/CVE-2019-15083.json create mode 100644 2020/12xxx/CVE-2020-12845.json create mode 100644 2020/12xxx/CVE-2020-12846.json create mode 100644 2020/12xxx/CVE-2020-12847.json create mode 100644 2020/12xxx/CVE-2020-12848.json create mode 100644 2020/12xxx/CVE-2020-12849.json create mode 100644 2020/12xxx/CVE-2020-12850.json create mode 100644 2020/12xxx/CVE-2020-12851.json create mode 100644 2020/12xxx/CVE-2020-12852.json create mode 100644 2020/12xxx/CVE-2020-12853.json diff --git a/2019/15xxx/CVE-2019-15083.json b/2019/15xxx/CVE-2019-15083.json new file mode 100644 index 00000000000..9afe3832453 --- /dev/null +++ b/2019/15xxx/CVE-2019-15083.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15083", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Default installations of Zoho ManageEngine ServiceDesk Plus 10.0 before 10500 are vulnerable to XSS injected by a workstation local administrator. Using the installed program names of the computer as a vector, the local administrator can execute code on the Manage Engine ServiceDesk administrator side. At \"Asset Home > Server > > software\" the administrator of ManageEngine can control what software is installed on the workstation. This table shows all the installed program names in the Software column. In this field, a remote attacker can inject malicious code in order to execute it when the ManageEngine administrator visualizes this page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/products/service-desk/readme.html", + "refsource": "MISC", + "name": "https://www.manageengine.com/products/service-desk/readme.html" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/service-desk/on-premises/readme.html#readme105", + "url": "https://www.manageengine.com/products/service-desk/on-premises/readme.html#readme105" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12845.json b/2020/12xxx/CVE-2020-12845.json new file mode 100644 index 00000000000..51bcfada307 --- /dev/null +++ b/2020/12xxx/CVE-2020-12845.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12845", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12846.json b/2020/12xxx/CVE-2020-12846.json new file mode 100644 index 00000000000..ddd3d50b84e --- /dev/null +++ b/2020/12xxx/CVE-2020-12846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12847.json b/2020/12xxx/CVE-2020-12847.json new file mode 100644 index 00000000000..2e9b5fe10a3 --- /dev/null +++ b/2020/12xxx/CVE-2020-12847.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12847", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12848.json b/2020/12xxx/CVE-2020-12848.json new file mode 100644 index 00000000000..fb2c37487c7 --- /dev/null +++ b/2020/12xxx/CVE-2020-12848.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12848", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12849.json b/2020/12xxx/CVE-2020-12849.json new file mode 100644 index 00000000000..1a35e5b6f2f --- /dev/null +++ b/2020/12xxx/CVE-2020-12849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12850.json b/2020/12xxx/CVE-2020-12850.json new file mode 100644 index 00000000000..04dc61ba0b9 --- /dev/null +++ b/2020/12xxx/CVE-2020-12850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12851.json b/2020/12xxx/CVE-2020-12851.json new file mode 100644 index 00000000000..ee75ce1ba69 --- /dev/null +++ b/2020/12xxx/CVE-2020-12851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12852.json b/2020/12xxx/CVE-2020-12852.json new file mode 100644 index 00000000000..8ebcf4185fc --- /dev/null +++ b/2020/12xxx/CVE-2020-12852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12853.json b/2020/12xxx/CVE-2020-12853.json new file mode 100644 index 00000000000..0d0ade4ba60 --- /dev/null +++ b/2020/12xxx/CVE-2020-12853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file