From cb2a2405b0e5ff0621763d7c1078b9fcd4714bd1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 12 Mar 2020 19:01:07 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/10xxx/CVE-2020-10516.json | 18 +++++++ 2020/10xxx/CVE-2020-10517.json | 18 +++++++ 2020/10xxx/CVE-2020-10518.json | 18 +++++++ 2020/10xxx/CVE-2020-10519.json | 18 +++++++ 2020/10xxx/CVE-2020-10520.json | 18 +++++++ 2020/10xxx/CVE-2020-10521.json | 18 +++++++ 2020/10xxx/CVE-2020-10522.json | 18 +++++++ 2020/10xxx/CVE-2020-10523.json | 18 +++++++ 2020/10xxx/CVE-2020-10524.json | 18 +++++++ 2020/10xxx/CVE-2020-10525.json | 18 +++++++ 2020/10xxx/CVE-2020-10526.json | 18 +++++++ 2020/10xxx/CVE-2020-10527.json | 18 +++++++ 2020/10xxx/CVE-2020-10528.json | 18 +++++++ 2020/10xxx/CVE-2020-10529.json | 18 +++++++ 2020/10xxx/CVE-2020-10530.json | 18 +++++++ 2020/10xxx/CVE-2020-10531.json | 87 ++++++++++++++++++++++++++++++++++ 2020/10xxx/CVE-2020-10532.json | 67 ++++++++++++++++++++++++++ 2020/10xxx/CVE-2020-10533.json | 18 +++++++ 18 files changed, 442 insertions(+) create mode 100644 2020/10xxx/CVE-2020-10516.json create mode 100644 2020/10xxx/CVE-2020-10517.json create mode 100644 2020/10xxx/CVE-2020-10518.json create mode 100644 2020/10xxx/CVE-2020-10519.json create mode 100644 2020/10xxx/CVE-2020-10520.json create mode 100644 2020/10xxx/CVE-2020-10521.json create mode 100644 2020/10xxx/CVE-2020-10522.json create mode 100644 2020/10xxx/CVE-2020-10523.json create mode 100644 2020/10xxx/CVE-2020-10524.json create mode 100644 2020/10xxx/CVE-2020-10525.json create mode 100644 2020/10xxx/CVE-2020-10526.json create mode 100644 2020/10xxx/CVE-2020-10527.json create mode 100644 2020/10xxx/CVE-2020-10528.json create mode 100644 2020/10xxx/CVE-2020-10529.json create mode 100644 2020/10xxx/CVE-2020-10530.json create mode 100644 2020/10xxx/CVE-2020-10531.json create mode 100644 2020/10xxx/CVE-2020-10532.json create mode 100644 2020/10xxx/CVE-2020-10533.json diff --git a/2020/10xxx/CVE-2020-10516.json b/2020/10xxx/CVE-2020-10516.json new file mode 100644 index 00000000000..522c5d91342 --- /dev/null +++ b/2020/10xxx/CVE-2020-10516.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10516", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10517.json b/2020/10xxx/CVE-2020-10517.json new file mode 100644 index 00000000000..531dce016a9 --- /dev/null +++ b/2020/10xxx/CVE-2020-10517.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10517", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10518.json b/2020/10xxx/CVE-2020-10518.json new file mode 100644 index 00000000000..11936e7fa9f --- /dev/null +++ b/2020/10xxx/CVE-2020-10518.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10518", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10519.json b/2020/10xxx/CVE-2020-10519.json new file mode 100644 index 00000000000..d1a72ddf789 --- /dev/null +++ b/2020/10xxx/CVE-2020-10519.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10519", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10520.json b/2020/10xxx/CVE-2020-10520.json new file mode 100644 index 00000000000..dbbc2122be2 --- /dev/null +++ b/2020/10xxx/CVE-2020-10520.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10520", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10521.json b/2020/10xxx/CVE-2020-10521.json new file mode 100644 index 00000000000..f97ef40d9f0 --- /dev/null +++ b/2020/10xxx/CVE-2020-10521.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10521", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10522.json b/2020/10xxx/CVE-2020-10522.json new file mode 100644 index 00000000000..ea3db280900 --- /dev/null +++ b/2020/10xxx/CVE-2020-10522.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10522", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10523.json b/2020/10xxx/CVE-2020-10523.json new file mode 100644 index 00000000000..f6ac95cf8ff --- /dev/null +++ b/2020/10xxx/CVE-2020-10523.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10523", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10524.json b/2020/10xxx/CVE-2020-10524.json new file mode 100644 index 00000000000..d6d5febdac2 --- /dev/null +++ b/2020/10xxx/CVE-2020-10524.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10524", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10525.json b/2020/10xxx/CVE-2020-10525.json new file mode 100644 index 00000000000..4e059e58f03 --- /dev/null +++ b/2020/10xxx/CVE-2020-10525.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10525", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10526.json b/2020/10xxx/CVE-2020-10526.json new file mode 100644 index 00000000000..f76daa549a7 --- /dev/null +++ b/2020/10xxx/CVE-2020-10526.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10526", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10527.json b/2020/10xxx/CVE-2020-10527.json new file mode 100644 index 00000000000..c5c850ef8f0 --- /dev/null +++ b/2020/10xxx/CVE-2020-10527.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10527", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10528.json b/2020/10xxx/CVE-2020-10528.json new file mode 100644 index 00000000000..244ed44b378 --- /dev/null +++ b/2020/10xxx/CVE-2020-10528.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10528", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10529.json b/2020/10xxx/CVE-2020-10529.json new file mode 100644 index 00000000000..5ee67387c94 --- /dev/null +++ b/2020/10xxx/CVE-2020-10529.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10529", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10530.json b/2020/10xxx/CVE-2020-10530.json new file mode 100644 index 00000000000..5d25529be70 --- /dev/null +++ b/2020/10xxx/CVE-2020-10530.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10530", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10531.json b/2020/10xxx/CVE-2020-10531.json new file mode 100644 index 00000000000..96544378768 --- /dev/null +++ b/2020/10xxx/CVE-2020-10531.json @@ -0,0 +1,87 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-10531", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html" + }, + { + "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=1044570", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/chromium/issues/detail?id=1044570" + }, + { + "url": "https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08", + "refsource": "MISC", + "name": "https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08" + }, + { + "url": "https://unicode-org.atlassian.net/browse/ICU-20958", + "refsource": "MISC", + "name": "https://unicode-org.atlassian.net/browse/ICU-20958" + }, + { + "url": "https://github.com/unicode-org/icu/pull/971", + "refsource": "MISC", + "name": "https://github.com/unicode-org/icu/pull/971" + }, + { + "url": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca", + "refsource": "MISC", + "name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca" + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10532.json b/2020/10xxx/CVE-2020-10532.json new file mode 100644 index 00000000000..c3bfb0b53fd --- /dev/null +++ b/2020/10xxx/CVE-2020-10532.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-10532", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The AD Helper component in WatchGuard Fireware before 5.8.5.10317 allows remote attackers to discover cleartext passwords via the /domains/list URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/services/tdr/tdr_ad_helper_c.html", + "refsource": "MISC", + "name": "https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/services/tdr/tdr_ad_helper_c.html" + }, + { + "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-001/-credential-disclosure-in-watchguard-fireware-ad-helper-component", + "refsource": "MISC", + "name": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-001/-credential-disclosure-in-watchguard-fireware-ad-helper-component" + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10533.json b/2020/10xxx/CVE-2020-10533.json new file mode 100644 index 00000000000..79a21fd571f --- /dev/null +++ b/2020/10xxx/CVE-2020-10533.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10533", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file