From ece6be001bd7a8f846fd4ebdb6d18ffc51eb7dde Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 21 Feb 2020 10:01:14 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10202.json | 5 +++++ 2020/5xxx/CVE-2020-5524.json | 15 ++++++++++----- 2020/5xxx/CVE-2020-5525.json | 15 ++++++++++----- 2020/5xxx/CVE-2020-5533.json | 11 ++++++++--- 2020/5xxx/CVE-2020-5534.json | 11 ++++++++--- 5 files changed, 41 insertions(+), 16 deletions(-) diff --git a/2019/10xxx/CVE-2019-10202.json b/2019/10xxx/CVE-2019-10202.json index 8222c3ef976..3fd1b4e7004 100644 --- a/2019/10xxx/CVE-2019-10202.json +++ b/2019/10xxx/CVE-2019-10202.json @@ -48,6 +48,11 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[flume-issues] 20200221 [jira] [Created] (FLUME-3356) Probable security issue in Flume", + "url": "https://lists.apache.org/thread.html/refea6018a2c4e9eb7838cab567ed219c3f726dcd83a5472fbb80d8d9@%3Cissues.flume.apache.org%3E" } ] }, diff --git a/2020/5xxx/CVE-2020-5524.json b/2020/5xxx/CVE-2020-5524.json index dd1c92e572b..8ef4046337e 100644 --- a/2020/5xxx/CVE-2020-5524.json +++ b/2020/5xxx/CVE-2020-5524.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN49410695/index.html" + "url": "https://jvn.jp/en/jp/JVN49410695/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN49410695/index.html" }, { - "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" } ] }, @@ -14,7 +18,7 @@ "description_data": [ { "lang": "eng", - "value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function." + "value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function." } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5524", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { @@ -59,4 +64,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5525.json b/2020/5xxx/CVE-2020-5525.json index 2832c3b478a..6d47f2e17d4 100644 --- a/2020/5xxx/CVE-2020-5525.json +++ b/2020/5xxx/CVE-2020-5525.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN49410695/index.html" + "url": "https://jvn.jp/en/jp/JVN49410695/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN49410695/index.html" }, { - "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" } ] }, @@ -14,7 +18,7 @@ "description_data": [ { "lang": "eng", - "value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen." + "value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen." } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5525", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { @@ -59,4 +64,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5533.json b/2020/5xxx/CVE-2020-5533.json index f11c94c2ca3..f6f3d590bf1 100644 --- a/2020/5xxx/CVE-2020-5533.json +++ b/2020/5xxx/CVE-2020-5533.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN49410695/index.html" + "url": "https://jvn.jp/en/jp/JVN49410695/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN49410695/index.html" }, { - "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5533", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5534.json b/2020/5xxx/CVE-2020-5534.json index 3e481e5118c..eba9999aa77 100644 --- a/2020/5xxx/CVE-2020-5534.json +++ b/2020/5xxx/CVE-2020-5534.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN49410695/index.html" + "url": "https://jvn.jp/en/jp/JVN49410695/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN49410695/index.html" }, { - "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5534", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": {