From a7f47d3254cae57f4c5af9a3653d42f4cfbbbc22 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 17 Apr 2020 13:01:16 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/10xxx/CVE-2020-10211.json | 61 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10377.json | 61 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10813.json | 61 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10947.json | 61 ++++++++++++++++++++++++++++++---- 2020/11xxx/CVE-2020-11793.json | 61 ++++++++++++++++++++++++++++++---- 5 files changed, 275 insertions(+), 30 deletions(-) diff --git a/2020/10xxx/CVE-2020-10211.json b/2020/10xxx/CVE-2020-10211.json index 467759fa503..1fa8af7fb10 100644 --- a/2020/10xxx/CVE-2020-10211.json +++ b/2020/10xxx/CVE-2020-10211.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10211", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10211", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote code execution vulnerability in UCB component of Mitel MiVoice Connect before 19.1 SP1 could allow an unauthenticated remote attacker to execute arbitrary scripts due to insufficient validation of URL parameters. A successful exploit could allow an attacker to gain access to sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mitel.com/support/security-advisories", + "refsource": "MISC", + "name": "https://www.mitel.com/support/security-advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0004", + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0004" } ] } diff --git a/2020/10xxx/CVE-2020-10377.json b/2020/10xxx/CVE-2020-10377.json index 4eee213a515..396447383ed 100644 --- a/2020/10xxx/CVE-2020-10377.json +++ b/2020/10xxx/CVE-2020-10377.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10377", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10377", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A weak encryption vulnerability in Mitel MiVoice Connect Client before 214.100.1214.0 could allow an unauthenticated attacker to gain access to user credentials. A successful exploit could allow an attacker to access the system with compromised user credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mitel.com/support/security-advisories", + "refsource": "MISC", + "name": "https://www.mitel.com/support/security-advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0004", + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0004" } ] } diff --git a/2020/10xxx/CVE-2020-10813.json b/2020/10xxx/CVE-2020-10813.json index 8792151b758..c09f2704e73 100644 --- a/2020/10xxx/CVE-2020-10813.json +++ b/2020/10xxx/CVE-2020-10813.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10813", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10813", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability in FTPDMIN 0.96 allows attackers to crash the server via a crafted packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sentex.ca/~mwandel/ftpdmin/", + "refsource": "MISC", + "name": "https://www.sentex.ca/~mwandel/ftpdmin/" + }, + { + "refsource": "MISC", + "name": "https://www.povonsec.com/ftpdmin-denial-of-service-exploit/", + "url": "https://www.povonsec.com/ftpdmin-denial-of-service-exploit/" } ] } diff --git a/2020/10xxx/CVE-2020-10947.json b/2020/10xxx/CVE-2020-10947.json index 968a85e76e5..e35e483f36d 100644 --- a/2020/10xxx/CVE-2020-10947.json +++ b/2020/10xxx/CVE-2020-10947.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10947", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10947", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6 allow Privilege Escalation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sophos.com/en-us.aspx", + "refsource": "MISC", + "name": "https://www.sophos.com/en-us.aspx" + }, + { + "refsource": "CONFIRM", + "name": "https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation", + "url": "https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation" } ] } diff --git a/2020/11xxx/CVE-2020-11793.json b/2020/11xxx/CVE-2020-11793.json index f0f6e9177b7..206269c7a56 100644 --- a/2020/11xxx/CVE-2020-11793.json +++ b/2020/11xxx/CVE-2020-11793.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11793", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11793", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://webkitgtk.org/security/WSA-2020-0004.html", + "url": "https://webkitgtk.org/security/WSA-2020-0004.html" + }, + { + "refsource": "CONFIRM", + "name": "https://wpewebkit.org/security/WSA-2020-0004.html", + "url": "https://wpewebkit.org/security/WSA-2020-0004.html" } ] }