mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3bb918497f
commit
f65317a884
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-11110",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-11110",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Grafana through 6.7.1 allows stored XSS."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -15,12 +15,9 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Honor View 20;Honor 20;Honor 20 PRO;Honor Magic2",
|
||||
"product_name": "Honor 20;HONOR 20 PRO;Honor Magic2;HUAWEI Mate 20 X;HUAWEI P30;HUAWEI P30 Pro;Honor View 20",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Versions earlier than 10.0.0.179(C636E3R4P3),Versions earlier than 10.0.0.180(C185E3R3P3),Versions earlier than 10.0.0.180(C432E10R3P4),Versions earlier than 10.0.0.188(C00E62R2P11)"
|
||||
},
|
||||
{
|
||||
"version_value": "Versions earlier than 10.0.0.187(C00E60R4P11)"
|
||||
},
|
||||
@ -29,6 +26,18 @@
|
||||
},
|
||||
{
|
||||
"version_value": "Versions earlier than 10.0.0.176(C00E60R2P11)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.135(C00E133R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "Versions earlier than 10.1.0.123(C431E22R3P5),Versions earlier than 10.1.0.126(C636E5R3P4),Versions earlier than 10.1.0.160(C00E160R2P11)"
|
||||
},
|
||||
{
|
||||
"version_value": "Versions earlier than 10.1.0.126(C185E8R5P1),Versions earlier than 10.1.0.126(C636E9R2P4),Versions earlier than 10.1.0.160(C00E160R2P8)"
|
||||
},
|
||||
{
|
||||
"version_value": "Versions earlier than 10.0.0.179(C636E3R4P3),Versions earlier than 10.0.0.180(C185E3R3P3),Versions earlier than 10.0.0.180(C432E10R3P4),Versions earlier than 10.0.0.181(C675E5R1P2)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -64,7 +73,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Huawei smartphones Honor View 20;Honor 20;Honor 20 PRO;Honor Magic2 with Versions earlier than 10.0.0.179(C636E3R4P3),Versions earlier than 10.0.0.180(C185E3R3P3),Versions earlier than 10.0.0.180(C432E10R3P4),Versions earlier than 10.0.0.188(C00E62R2P11);Versions earlier than 10.0.0.187(C00E60R4P11);Versions earlier than 10.0.0.187(C00E60R4P11);Versions earlier than 10.0.0.176(C00E60R2P11) have an out of bound read vulnerability. The software reads data past the end of the intended buffer. The attacker tricks the user into installing a crafted application, successful exploit may cause information disclosure or service abnormal."
|
||||
"value": "Honor 20;HONOR 20 PRO;Honor Magic2;HUAWEI Mate 20 X;HUAWEI P30;HUAWEI P30 Pro;Honor View 20 smartphones with versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.176(C00E60R2P11);9.1.0.135(C00E133R2P1); versions earlier than 10.1.0.123(C431E22R3P5), versions earlier than 10.1.0.126(C636E5R3P4), versions earlier than 10.1.0.160(C00E160R2P11); versions earlier than 10.1.0.126(C185E8R5P1), versions earlier than 10.1.0.126(C636E9R2P4), versions earlier than 10.1.0.160(C00E160R2P8); versions earlier than 10.0.0.179(C636E3R4P3), versions earlier than 10.0.0.180(C185E3R3P3), versions earlier than 10.0.0.180(C432E10R3P4), versions earlier than 10.0.0.181(C675E5R1P2) have an out of bound read vulnerability. The software reads data past the end of the intended buffer. The attacker tricks the user into installing a crafted application, successful exploit may cause information disclosure or service abnormal."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,7 +1,7 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"AKA": "TWCERT/CC",
|
||||
"ASSIGNER": "twcert@cert.org.tw",
|
||||
"ASSIGNER": "cve@cert.org.tw",
|
||||
"DATE_PUBLIC": "2020-02-11T03:59:00.000Z",
|
||||
"ID": "CVE-2020-3933",
|
||||
"STATE": "PUBLIC",
|
||||
@ -89,16 +89,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html",
|
||||
"name": "https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac",
|
||||
"name": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b"
|
||||
"refsource": "MISC",
|
||||
"url": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b",
|
||||
"name": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,7 +1,7 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"AKA": "TWCERT/CC",
|
||||
"ASSIGNER": "twcert@cert.org.tw",
|
||||
"ASSIGNER": "cve@cert.org.tw",
|
||||
"DATE_PUBLIC": "2020-02-11T03:59:00.000Z",
|
||||
"ID": "CVE-2020-3934",
|
||||
"STATE": "PUBLIC",
|
||||
@ -89,16 +89,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-3318-89f76-2.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac",
|
||||
"name": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac"
|
||||
"refsource": "MISC",
|
||||
"url": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b",
|
||||
"name": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-3318-89f76-2.html",
|
||||
"name": "https://www.twcert.org.tw/en/cp-139-3318-89f76-2.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,11 +1,11 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"AKA": "TWCERT/CC",
|
||||
"ASSIGNER": "twcert@cert.org.tw",
|
||||
"ASSIGNER": "cve@cert.org.tw",
|
||||
"DATE_PUBLIC": "2020-02-11T03:59:00.000Z",
|
||||
"ID": "CVE-2020-3935",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "TAIWAN SECOM CO., LTD. – Sensitivity Information Exposure"
|
||||
"TITLE": "TAIWAN SECOM CO., LTD. \u2013 Sensitivity Information Exposure"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -51,7 +51,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users’ information by cleartext in the cookie, which divulges password to attackers."
|
||||
"value": "TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users\u2019 information by cleartext in the cookie, which divulges password to attackers."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -89,16 +89,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-3319-d7b65-2.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac",
|
||||
"name": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac"
|
||||
"refsource": "MISC",
|
||||
"url": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b",
|
||||
"name": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-3319-d7b65-2.html",
|
||||
"name": "https://www.twcert.org.tw/en/cp-139-3319-d7b65-2.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-9077",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "HUAWEI P30",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Versions earlier than 10.1.0.160(C00E160R2P11)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Information Exposure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200722-03-smartphone-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200722-03-smartphone-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "HUAWEI P30 smart phones with versions earlier than 10.1.0.160(C00E160R2P11) have an information exposure vulnerability. The system does not properly authenticate the application that access a specified interface. Attackers can trick users into installing malicious software to exploit this vulnerability and obtain some information about the device. Successful exploit may cause information disclosure."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-9251",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "HUAWEI Mate 20",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Versions earlier than 10.1.0.160(C00E160R2P11)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Improper Authorization"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200722-02-smartphone-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200722-02-smartphone-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "HUAWEI Mate 20 smartphones with versions earlier than 10.1.0.160(C00E160R2P11) have an improper authorization vulnerability. The software does not properly restrict certain operation in certain scenario, the attacker should do certain configuration before the user turns on student mode function. Successful exploit could allow the attacker to bypass the limit of student mode function. Affected product versions include: HUAWEI Mate 20 versions Versions earlier than 10.1.0.160(C00E160R3P8)."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user