"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-02-21 10:01:14 +00:00
parent ab0384729b
commit ece6be001b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
5 changed files with 41 additions and 16 deletions

View File

@ -48,6 +48,11 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[flume-issues] 20200221 [jira] [Created] (FLUME-3356) Probable security issue in Flume",
"url": "https://lists.apache.org/thread.html/refea6018a2c4e9eb7838cab567ed219c3f726dcd83a5472fbb80d8d9@%3Cissues.flume.apache.org%3E"
}
]
},

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
},
{
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
}
]
},
@ -14,7 +18,7 @@
"description_data": [
{
"lang": "eng",
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function."
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function."
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5524",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {
@ -59,4 +64,4 @@
}
]
}
}
}

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
},
{
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
}
]
},
@ -14,7 +18,7 @@
"description_data": [
{
"lang": "eng",
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen."
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen."
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5525",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {
@ -59,4 +64,4 @@
}
]
}
}
}

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
},
{
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5533",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
},
{
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5534",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {