mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
875082211d
commit
e1507d74d4
@ -91,6 +91,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-1a4b1c8271",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0978",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -69,6 +69,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4417-1",
|
||||
"url": "https://usn.ubuntu.com/4417-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1586630",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1586630"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1639734",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1639734"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0967",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0982",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0967",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0982",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0967",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0982",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0967",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0982",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0967",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0982",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1450353",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1450353"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1642400",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1642400"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1562600",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1562600"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1634738",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1634738"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1608068%2C1609951%2C1631187%2C1637682",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1608068%2C1609951%2C1631187%2C1637682"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0983",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,14 +4,150 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-9101",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "IPS Module",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "NGFW Module",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Secospace USG6300",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Secospace USG6500",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Secospace USG6600",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "USG9500",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "V500R001C30"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R001C60"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C00"
|
||||
},
|
||||
{
|
||||
"version_value": "V500R005C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Out-of-bounds Write"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-9256",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Huawei",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Mate 30 Pro",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Versions earlier than 10.1.0.150(C00E136R5P3)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Improper Authorization"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-05-smartphone-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-05-smartphone-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Huawei Mate 30 Pro smartphones with versions earlier than 10.1.0.150(C00E136R5P3) have an improper authorization vulnerability. The system does not properly restrict the use of system service by applications, the attacker should trick the user into installing a malicious application, successful exploit could cause a denial of audio service."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user