mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ab0384729b
commit
ece6be001b
@ -48,6 +48,11 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[flume-issues] 20200221 [jira] [Created] (FLUME-3356) Probable security issue in Flume",
|
||||
"url": "https://lists.apache.org/thread.html/refea6018a2c4e9eb7838cab567ed219c3f726dcd83a5472fbb80d8d9@%3Cissues.flume.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -14,7 +18,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function."
|
||||
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5524",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
@ -59,4 +64,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -14,7 +18,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen."
|
||||
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5525",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
@ -59,4 +64,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5533",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN49410695/index.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5534",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
Loading…
x
Reference in New Issue
Block a user