From cb2081babfb689b4d7f0de04ccd9ed2d038e04c7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 27 Apr 2020 15:01:12 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/21xxx/CVE-2018-21093.json | 70 ++++++++++++++++-- 2018/21xxx/CVE-2018-21094.json | 70 ++++++++++++++++-- 2019/18xxx/CVE-2019-18823.json | 87 +++++++++++++++++++++++ 2019/20xxx/CVE-2019-20002.json | 56 +++++++++++++-- 2020/11xxx/CVE-2020-11415.json | 56 +++++++++++++-- 2020/11xxx/CVE-2020-11810.json | 76 ++++++++++++++++++-- 2020/11xxx/CVE-2020-11817.json | 56 +++++++++++++-- 2020/11xxx/CVE-2020-11821.json | 56 +++++++++++++-- 2020/11xxx/CVE-2020-11822.json | 56 +++++++++++++-- 2020/12xxx/CVE-2020-12120.json | 61 ++++++++++++++-- 2020/12xxx/CVE-2020-12133.json | 66 +++++++++++++++-- 2020/12xxx/CVE-2020-12138.json | 61 ++++++++++++++-- 2020/12xxx/CVE-2020-12242.json | 56 +++++++++++++-- 2020/12xxx/CVE-2020-12266.json | 61 ++++++++++++++-- 2020/1xxx/CVE-2020-1804.json | 50 ++++++++++++- 2020/1xxx/CVE-2020-1805.json | 50 ++++++++++++- 2020/1xxx/CVE-2020-1806.json | 50 ++++++++++++- 2020/1xxx/CVE-2020-1807.json | 50 ++++++++++++- 2020/1xxx/CVE-2020-1845.json | 50 ++++++++++++- 2020/7xxx/CVE-2020-7135.json | 126 ++++++++++++++++++++++++++++++++- 2020/8xxx/CVE-2020-8840.json | 10 +++ 2020/9xxx/CVE-2020-9072.json | 50 ++++++++++++- 22 files changed, 1225 insertions(+), 99 deletions(-) create mode 100644 2019/18xxx/CVE-2019-18823.json diff --git a/2018/21xxx/CVE-2018-21093.json b/2018/21xxx/CVE-2018-21093.json index 5378f62f983..b818e516529 100644 --- a/2018/21xxx/CVE-2018-21093.json +++ b/2018/21xxx/CVE-2018-21093.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21093", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21093", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D8500 before 1.0.3.42, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, EX6000 before 1.0.0.30, EX6100 before 1.0.2.24, EX6120 before 1.0.0.40, EX6130 before 1.0.0.22, EX6150 before 1.0.0.42, EX6200 before 1.0.3.88, EX7000 before 1.0.0.66, R6250 before 1.0.4.26, R6300-2CXNAS before 1.0.3.60, R6300v2 before 1.0.4.28, R6400 before 1.0.1.36, R6400v2 before 1.0.2.52, R6700 before 1.0.1.46, R6900 before 1.0.1.46, R7000 before 1.0.9.28, R7000P before 1.3.1.44, R6900P before 1.3.1.44, R7100LG before 1.0.0.46, R7300 before 1.0.0.68, R7900 before 1.0.2.10, R8000 before 1.0.4.18, R8000P before 1.3.0.10, R7900P before 1.3.0.10, R8500 before 1.0.2.122, R8300 before 1.0.2.122, RBW30 before 2.1.2.6, WN2500RPv2 before 1.0.0.54, and WNR3500Lv2 before 1.2.0.56." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000060456/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Modem-Routers-Wireless-Extenders-and-Orbi-Satellites-PSV-2017-2011", + "url": "https://kb.netgear.com/000060456/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Modem-Routers-Wireless-Extenders-and-Orbi-Satellites-PSV-2017-2011" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT", + "availabilityImpact": "LOW", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:A/A:L/C:H/I:H/PR:H/S:U/UI:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/21xxx/CVE-2018-21094.json b/2018/21xxx/CVE-2018-21094.json index 0e845aeb979..92b3ff4fb6d 100644 --- a/2018/21xxx/CVE-2018-21094.json +++ b/2018/21xxx/CVE-2018-21094.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21094", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21094", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350", + "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:N/A:L/C:L/I:L/PR:N/S:U/UI:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18823.json b/2019/18xxx/CVE-2019-18823.json new file mode 100644 index 00000000000..5f6d553b731 --- /dev/null +++ b/2019/18xxx/CVE-2019-18823.json @@ -0,0 +1,87 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18823", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.cs.wisc.edu/htcondor/new.html", + "refsource": "MISC", + "name": "https://research.cs.wisc.edu/htcondor/new.html" + }, + { + "refsource": "MISC", + "name": "https://research.cs.wisc.edu/htcondor/", + "url": "https://research.cs.wisc.edu/htcondor/" + }, + { + "refsource": "CONFIRM", + "name": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003.html", + "url": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003.html" + }, + { + "refsource": "MISC", + "name": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002.html", + "url": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002.html" + }, + { + "refsource": "MISC", + "name": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001.html", + "url": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001.html" + }, + { + "refsource": "MISC", + "name": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004.html", + "url": "https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20002.json b/2019/20xxx/CVE-2019-20002.json index d124ca0305e..120b5313680 100644 --- a/2019/20xxx/CVE-2019-20002.json +++ b/2019/20xxx/CVE-2019-20002.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20002", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20002", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Formula Injection exists in the export feature in SolarWinds WebHelpDesk 12.7.1 via a value (provided by a low-privileged user in the Subject field of a help request form) that is mishandled in a TicketActions/view?tab=group TSV export by an admin user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://medium.com/@ayaan.saikia91/formula-injection-vulnerability-on-solarwinds-webhelpdesk-12-7-1-37569cd4cdc1", + "url": "https://medium.com/@ayaan.saikia91/formula-injection-vulnerability-on-solarwinds-webhelpdesk-12-7-1-37569cd4cdc1" } ] } diff --git a/2020/11xxx/CVE-2020-11415.json b/2020/11xxx/CVE-2020-11415.json index 128e7541a37..db389c8bf4f 100644 --- a/2020/11xxx/CVE-2020-11415.json +++ b/2020/11xxx/CVE-2020-11415.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11415", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11415", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Sonatype Nexus Repository Manager 2.x before 2.14.17 and 3.x before 3.22.1. Admin users can retrieve the LDAP server system username/password (as configured in nxrm) in cleartext." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.sonatype.com/hc/en-us/articles/360045360854", + "url": "https://support.sonatype.com/hc/en-us/articles/360045360854" } ] } diff --git a/2020/11xxx/CVE-2020-11810.json b/2020/11xxx/CVE-2020-11810.json index 0df373542ba..c318f2579fb 100644 --- a/2020/11xxx/CVE-2020-11810.json +++ b/2020/11xxx/CVE-2020-11810.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11810", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11810", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab", + "url": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab" + }, + { + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2020-11810", + "url": "https://security-tracker.debian.org/tracker/CVE-2020-11810" + }, + { + "refsource": "CONFIRM", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1169925", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1169925" + }, + { + "refsource": "CONFIRM", + "name": "https://community.openvpn.net/openvpn/ticket/1272", + "url": "https://community.openvpn.net/openvpn/ticket/1272" + }, + { + "refsource": "CONFIRM", + "name": "https://patchwork.openvpn.net/patch/1079/", + "url": "https://patchwork.openvpn.net/patch/1079/" } ] } diff --git a/2020/11xxx/CVE-2020-11817.json b/2020/11xxx/CVE-2020-11817.json index c352fb56ed5..304db4f8ce9 100644 --- a/2020/11xxx/CVE-2020-11817.json +++ b/2020/11xxx/CVE-2020-11817.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11817", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11817", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Rukovoditel V2.5.2, attackers can upload an arbitrary file to the server just changing the the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs with the Maintenance Mode setting." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://fatihhcelik.blogspot.com/2020/01/rukovoditel-maintenance-mode.html", + "refsource": "MISC", + "name": "https://fatihhcelik.blogspot.com/2020/01/rukovoditel-maintenance-mode.html" } ] } diff --git a/2020/11xxx/CVE-2020-11821.json b/2020/11xxx/CVE-2020-11821.json index 9c33c0e55ce..bfbc456b5cd 100644 --- a/2020/11xxx/CVE-2020-11821.json +++ b/2020/11xxx/CVE-2020-11821.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11821", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11821", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://fatihhcelik.blogspot.com/2020/01/rukovoditel-password-hash-in-cookie-url.html", + "refsource": "MISC", + "name": "https://fatihhcelik.blogspot.com/2020/01/rukovoditel-password-hash-in-cookie-url.html" } ] } diff --git a/2020/11xxx/CVE-2020-11822.json b/2020/11xxx/CVE-2020-11822.json index b7380f3caec..ba1284a10e2 100644 --- a/2020/11xxx/CVE-2020-11822.json +++ b/2020/11xxx/CVE-2020-11822.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11822", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11822", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the application structure --> user access groups page. Thus, an attacker can inject malicious script to steal all users' valuable data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://fatihhcelik.blogspot.com/2020/01/rukovoditel-stored-xss-via-group-name.html", + "refsource": "MISC", + "name": "https://fatihhcelik.blogspot.com/2020/01/rukovoditel-stored-xss-via-group-name.html" } ] } diff --git a/2020/12xxx/CVE-2020-12120.json b/2020/12xxx/CVE-2020-12120.json index 8cf43970258..7a20c23e501 100644 --- a/2020/12xxx/CVE-2020-12120.json +++ b/2020/12xxx/CVE-2020-12120.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12120", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12120", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Correos Express addon for PrestaShop 1.6 through 1.7 allows remote attackers to obtain sensitive information, such as a service's owner password that can be used to modify orders via SOAP. Attackers can also retrieve information about orders or buyers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://addons.prestashop.com/en/delivery-date/27273-correos-express-solutions-of-urgent-transport.html", + "refsource": "MISC", + "name": "https://addons.prestashop.com/en/delivery-date/27273-correos-express-solutions-of-urgent-transport.html" + }, + { + "refsource": "MISC", + "name": "https://ia-informatica.com/it/CVE-2020-12120", + "url": "https://ia-informatica.com/it/CVE-2020-12120" } ] } diff --git a/2020/12xxx/CVE-2020-12133.json b/2020/12xxx/CVE-2020-12133.json index b181f1028c9..ae4bfd55eb4 100644 --- a/2020/12xxx/CVE-2020-12133.json +++ b/2020/12xxx/CVE-2020-12133.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12133", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12133", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Apros Evolution, ConsciusMap, and Furukawa provisioning systems through 2.8.1 allow remote code execution because of javax.faces.ViewState Java deserialization." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.furukawa.co.jp", + "refsource": "MISC", + "name": "https://www.furukawa.co.jp" + }, + { + "url": "https://www.tecnoredsa.com.ar", + "refsource": "MISC", + "name": "https://www.tecnoredsa.com.ar" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157383/Furukawa-Electric-ConsciusMAP-2.8.1-Java-Deserialization-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/157383/Furukawa-Electric-ConsciusMAP-2.8.1-Java-Deserialization-Remote-Code-Execution.html" } ] } diff --git a/2020/12xxx/CVE-2020-12138.json b/2020/12xxx/CVE-2020-12138.json index e6a1a50287c..65bfbb5d991 100644 --- a/2020/12xxx/CVE-2020-12138.json +++ b/2020/12xxx/CVE-2020-12138.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12138", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12138", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "AMD ATI atillk64.sys 5.11.9.0 allows low-privileged users to interact directly with physical memory by calling one of several driver routines that map physical memory into the virtual address space of the calling process. This could enable low-privileged users to achieve NT AUTHORITY\\SYSTEM privileges via a DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://eclypsium.com/2019/11/12/mother-of-all-drivers/", + "refsource": "MISC", + "name": "https://eclypsium.com/2019/11/12/mother-of-all-drivers/" + }, + { + "refsource": "MISC", + "name": "https://h0mbre.github.io/atillk64_exploit/", + "url": "https://h0mbre.github.io/atillk64_exploit/" } ] } diff --git a/2020/12xxx/CVE-2020-12242.json b/2020/12xxx/CVE-2020-12242.json index ca840bd5d1a..0e3fcc5c4f3 100644 --- a/2020/12xxx/CVE-2020-12242.json +++ b/2020/12xxx/CVE-2020-12242.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12242", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12242", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Valve Source allows local users to gain privileges by writing to the /tmp/hl2_relaunch file, which is later executed in the context of a different user account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://0xem.ma/cve/2020/04/28/Source-hl2-relaunch-exec.html", + "url": "https://0xem.ma/cve/2020/04/28/Source-hl2-relaunch-exec.html" } ] } diff --git a/2020/12xxx/CVE-2020-12266.json b/2020/12xxx/CVE-2020-12266.json index 9a448ab910e..3f54c875702 100644 --- a/2020/12xxx/CVE-2020-12266.json +++ b/2020/12xxx/CVE-2020-12266.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12266", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12266", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on WAVLINK WL-WN579G3 M79X3.V5030.180719, WL-WN575A3 RPT75A3.V4300.180801, and WL-WN530HG4 M30HG4.V5030.191116 devices. There are multiple externally accessible pages that do not require any sort of authentication, and store system information for internal usage. The devices automatically query these pages to update dashboards and other statistics, but the pages can be accessed externally without any authentication. All the pages follow the naming convention live_(string).shtml. Among the information disclosed is: interface status logs, IP address of the device, MAC address of the device, model and current firmware version, location, all running processes, all interfaces and their statuses, all current DHCP leases and the associated hostnames, all other wireless networks in range of the router, memory statistics, and components of the configuration of the device such as enabled features." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.wavlink.com", + "refsource": "MISC", + "name": "https://www.wavlink.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-12266", + "url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-12266" } ] } diff --git a/2020/1xxx/CVE-2020-1804.json b/2020/1xxx/CVE-2020-1804.json index f6471446697..dd481e11ede 100644 --- a/2020/1xxx/CVE-2020-1804.json +++ b/2020/1xxx/CVE-2020-1804.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1804", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "Honor V10", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.0.0.156(C00E156R2P4)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Three Out of Bounds" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-02-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-02-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei Honor V10 smartphones with versions earlier than 10.0.0.156(C00E156R2P4) has three out of bounds vulnerabilities. Certain driver program does not sufficiently validate certain parameters received, that would lead to several bytes out of bound read. Successful exploit may cause information disclosure or service abnormal. This is 1 out of 3 out of bounds vulnerabilities found. Different than CVE-2020-1805 and CVE-2020-1806." } ] } diff --git a/2020/1xxx/CVE-2020-1805.json b/2020/1xxx/CVE-2020-1805.json index 8d00d985753..c175c779347 100644 --- a/2020/1xxx/CVE-2020-1805.json +++ b/2020/1xxx/CVE-2020-1805.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1805", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "Honor V10", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.0.0.156(C00E156R2P4)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Three Out of Bounds" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-02-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-02-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei Honor V10 smartphones with versions earlier than 10.0.0.156(C00E156R2P4) has three out of bounds vulnerabilities. Certain driver program does not sufficiently validate certain parameters received, that would lead to several bytes out of bound read. Successful exploit may cause information disclosure or service abnormal. This is 2 out of 3 out of bounds vulnerabilities found. Different than CVE-2020-1804 and CVE-2020-1806." } ] } diff --git a/2020/1xxx/CVE-2020-1806.json b/2020/1xxx/CVE-2020-1806.json index f976ce7d3cf..0341a9b6f52 100644 --- a/2020/1xxx/CVE-2020-1806.json +++ b/2020/1xxx/CVE-2020-1806.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1806", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "Honor V10", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.0.0.156(C00E156R2P4)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Three Out of Bounds" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-02-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-02-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei Honor V10 smartphones with versions earlier than 10.0.0.156(C00E156R2P4) has three out of bounds vulnerabilities. Certain driver program does not sufficiently validate certain parameters received, that would lead to several bytes out of bound read. Successful exploit may cause information disclosure or service abnormal. This is 3 out of 3 out of bounds vulnerabilities found. Different than CVE-2020-1804 and CVE-2020-1805." } ] } diff --git a/2020/1xxx/CVE-2020-1807.json b/2020/1xxx/CVE-2020-1807.json index 02283fca06f..3b6edebee2c 100644 --- a/2020/1xxx/CVE-2020-1807.json +++ b/2020/1xxx/CVE-2020-1807.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1807", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "HUAWEI Mate 20", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.0.0.188(C00E74R3P8)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.188(C00E74R3P8) have an improper authorization vulnerability. The software does not properly restrict certain user's modification of certain configuration file, successful exploit could allow the attacker to bypass app lock after a series of operation in ADB mode." } ] } diff --git a/2020/1xxx/CVE-2020-1845.json b/2020/1xxx/CVE-2020-1845.json index b517abddddd..c6ef2822764 100644 --- a/2020/1xxx/CVE-2020-1845.json +++ b/2020/1xxx/CVE-2020-1845.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1845", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "PCManager", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.0.5.53" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Local Privilege Escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-pcmanager-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-pcmanager-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei PCManager product with versions earlier than 10.0.5.53 have a local privilege escalation vulnerability. An authenticated, local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege." } ] } diff --git a/2020/7xxx/CVE-2020-7135.json b/2020/7xxx/CVE-2020-7135.json index b8f42f53e5b..ca31ff5cee9 100644 --- a/2020/7xxx/CVE-2020-7135.json +++ b/2020/7xxx/CVE-2020-7135.json @@ -4,14 +4,134 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-7135", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HPE", + "product": { + "product_data": [ + { + "product_name": "HPE Service Pack for ProLiant", + "version": { + "version_data": [ + { + "version_value": "2018.06.0" + }, + { + "version_value": "2018.09.0" + }, + { + "version_value": "2018.11.0" + } + ] + } + }, + { + "product_name": "HPE Server Solid State Drives", + "version": { + "version_data": [ + { + "version_value": "HPG2" + } + ] + } + }, + { + "product_name": "HPE Server SAS Hard Drives", + "version": { + "version_data": [ + { + "version_value": "HPG2" + } + ] + } + }, + { + "product_name": "HPE Server SATA Hard Drives", + "version": { + "version_data": [ + { + "version_value": "HPG2" + } + ] + } + }, + { + "product_name": "HPE SATA Read Intensive Solid State Drives", + "version": { + "version_data": [ + { + "version_value": "HPG2" + } + ] + } + }, + { + "product_name": "HPE NVMe Mixed Use Solid State Drives", + "version": { + "version_data": [ + { + "version_value": "HPG2" + } + ] + } + }, + { + "product_name": "HPE Business Critical Hard Drives", + "version": { + "version_data": [ + { + "version_value": "HPG2" + } + ] + } + }, + { + "product_name": "HPE Server Enterprise Hard Drives", + "version": { + "version_data": [ + { + "version_value": "HPG2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "local execution of arbitrary code with privilege elevation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03945en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03945en_us" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A potential security vulnerability has been identified in the disk drive firmware installers named Supplemental Update / Online ROM Flash Component on HPE servers running Linux. The vulnerable software is included in the HPE Service Pack for ProLiant (SPP) releases 2018.06.0, 2018.09.0, and 2018.11.0. The vulnerable software is the Supplemental Update / Online ROM Flash Component for Linux (x64) software. The installer in this software component could be locally exploited to execute arbitrary code. Drive Models can be found in the Vulnerability Resolution field of the security bulletin. The 2019_03 SPP and Supplemental update / Online ROM Flash Component for Linux (x64) after 2019.03.0 has fixed this issue." } ] } diff --git a/2020/8xxx/CVE-2020-8840.json b/2020/8xxx/CVE-2020-8840.json index 6d26ee5c6c3..03d297f95ef 100644 --- a/2020/8xxx/CVE-2020-8840.json +++ b/2020/8xxx/CVE-2020-8840.json @@ -216,6 +216,16 @@ "refsource": "MLIST", "name": "[ranger-dev] 20200417 Re: Review Request 72332: RANGER-2770 : Upgrade jackson-databind to version 2.9.10.4 [CVE-2020-8840] - (Ranger)", "url": "https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[ranger-dev] 20200427 [jira] [Commented] (RANGER-2770) Upgrade jackson-databind to version 2.10.0 [CVE-2020-8840] - (Ranger)", + "url": "https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[ranger-dev] 20200427 [jira] [Resolved] (RANGER-2770) Upgrade jackson-databind to version 2.10.0 [CVE-2020-8840] - (Ranger)", + "url": "https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E" } ] } diff --git a/2020/9xxx/CVE-2020-9072.json b/2020/9xxx/CVE-2020-9072.json index a9dbe5e0b29..7ac9b5c95b1 100644 --- a/2020/9xxx/CVE-2020-9072.json +++ b/2020/9xxx/CVE-2020-9072.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9072", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "OSD", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than OSD_uwp_9.0.32.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Local Privilege Escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-osd-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-osd-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei OSD product with versions earlier than OSD_uwp_9.0.32.0 have a local privilege escalation vulnerability. An authenticated, local attacker can constructs a specific file path to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege." } ] }