From fc32378a48e3afce8c19d9b9e226e0299bdabef5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 25 Mar 2020 21:01:24 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/10xxx/CVE-2020-10881.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10882.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10883.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10884.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10885.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10886.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10887.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10888.json | 63 ++++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10959.json | 18 ++++++++++ 2020/10xxx/CVE-2020-10960.json | 18 ++++++++++ 2020/10xxx/CVE-2020-10961.json | 18 ++++++++++ 2020/10xxx/CVE-2020-10962.json | 18 ++++++++++ 2020/3xxx/CVE-2020-3770.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3771.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3772.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3773.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3774.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3775.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3776.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3777.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3778.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3779.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3780.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3781.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3782.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3783.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3784.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3785.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3786.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3787.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3788.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3789.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3790.json | 62 ++++++++++++++++++++++++++++----- 2020/3xxx/CVE-2020-3791.json | 62 ++++++++++++++++++++++++++++----- 2020/5xxx/CVE-2020-5261.json | 2 +- 2020/9xxx/CVE-2020-9274.json | 5 +++ 2020/9xxx/CVE-2020-9359.json | 5 +++ 2020/9xxx/CVE-2020-9365.json | 5 +++ 2020/9xxx/CVE-2020-9520.json | 50 +++++++++++++++++++++++++-- 39 files changed, 1757 insertions(+), 250 deletions(-) create mode 100644 2020/10xxx/CVE-2020-10959.json create mode 100644 2020/10xxx/CVE-2020-10960.json create mode 100644 2020/10xxx/CVE-2020-10961.json create mode 100644 2020/10xxx/CVE-2020-10962.json diff --git a/2020/10xxx/CVE-2020-10881.json b/2020/10xxx/CVE-2020-10881.json index 7e283ca7ac9..52c1eb3fbdf 100644 --- a/2020/10xxx/CVE-2020-10881.json +++ b/2020/10xxx/CVE-2020-10881.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10881", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "Pedro Ribeiro and Radek Domanski of Team Flashback", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-9660." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121: Stack-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-333/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-333/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10882.json b/2020/10xxx/CVE-2020-10882.json index a8714b91528..6f8c028101c 100644 --- a/2020/10xxx/CVE-2020-10882.json +++ b/2020/10xxx/CVE-2020-10882.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10882", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "Pedro Ribeiro and Radek Domanski of Team Flashback", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tdpServer service, which listens on UDP port 20002 by default. When parsing the slave_mac parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-9650." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-334/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-334/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10883.json b/2020/10xxx/CVE-2020-10883.json index d0a3d14c4fb..e8ddbb12b44 100644 --- a/2020/10xxx/CVE-2020-10883.json +++ b/2020/10xxx/CVE-2020-10883.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10883", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "Pedro Ribeiro and Radek Domanski of Team Flashback", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows local attackers to escalate privileges on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the file system. The issue lies in the lack of proper permissions set on the file system. An attacker can leverage this vulnerability to escalate privileges. Was ZDI-CAN-9651." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-732: Incorrect Permission Assignment for Critical Resource" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-335/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-335/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10884.json b/2020/10xxx/CVE-2020-10884.json index 1dda305d9d0..e60b8134946 100644 --- a/2020/10xxx/CVE-2020-10884.json +++ b/2020/10xxx/CVE-2020-10884.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10884", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "Pedro Ribeiro and Radek Domanski of Team Flashback", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows network-adjacent attackers execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tdpServer service, which listens on UDP port 20002 by default. This issue results from the use of hard-coded encryption key. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9652." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-321: Use of Hard-coded Cryptographic Key" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-336/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-336/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10885.json b/2020/10xxx/CVE-2020-10885.json index f397c65c7cd..07763f2007f 100644 --- a/2020/10xxx/CVE-2020-10885.json +++ b/2020/10xxx/CVE-2020-10885.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10885", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "Pedro Ribeiro and Radek Domanski of Team Flashback", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. The issue results from the lack of proper validation of DNS reponses prior to further processing. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the root user. Was ZDI-CAN-9661." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-337/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-337/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10886.json b/2020/10xxx/CVE-2020-10886.json index 525c5af4c73..d09cf427652 100644 --- a/2020/10xxx/CVE-2020-10886.json +++ b/2020/10xxx/CVE-2020-10886.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10886", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "F-Secure Labs - Mark Barnes, Toby Drew, Max Van Amerongen, and James Loureiro", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tmpServer service, which listens on TCP port 20002. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9662." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-339/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-339/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10887.json b/2020/10xxx/CVE-2020-10887.json index 52688d4709c..00604c8e831 100644 --- a/2020/10xxx/CVE-2020-10887.json +++ b/2020/10xxx/CVE-2020-10887.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10887", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "F-Secure Labs - Mark Barnes, Toby Drew, Max Van Amerongen, and James Loureiro", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9663." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-693: Protection Mechanism Failure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-338/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-338/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10888.json b/2020/10xxx/CVE-2020-10888.json index 51f647c539d..01d4c981af9 100644 --- a/2020/10xxx/CVE-2020-10888.json +++ b/2020/10xxx/CVE-2020-10888.json @@ -1,18 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2020-10888", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Archer A7", + "version": { + "version_data": [ + { + "version_value": "Firmware Ver: 190726" + } + ] + } + } + ] + }, + "vendor_name": "TP-Link" + } + ] + } + }, + "credit": "F-Secure Labs - Mark Barnes, Toby Drew, Max Van Amerongen, and James Loureiro", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability allows remote attackers to bypass authentication on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SSH port forwarding requests during initial setup. The issue results from the lack of proper authentication prior to establishing SSH port forwarding rules. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the WAN interface. Was ZDI-CAN-9664." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-340/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-340/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10959.json b/2020/10xxx/CVE-2020-10959.json new file mode 100644 index 00000000000..e1a6f92531a --- /dev/null +++ b/2020/10xxx/CVE-2020-10959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10960.json b/2020/10xxx/CVE-2020-10960.json new file mode 100644 index 00000000000..cd196055cd4 --- /dev/null +++ b/2020/10xxx/CVE-2020-10960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10961.json b/2020/10xxx/CVE-2020-10961.json new file mode 100644 index 00000000000..241b25df729 --- /dev/null +++ b/2020/10xxx/CVE-2020-10961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10962.json b/2020/10xxx/CVE-2020-10962.json new file mode 100644 index 00000000000..6811a98be29 --- /dev/null +++ b/2020/10xxx/CVE-2020-10962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3770.json b/2020/3xxx/CVE-2020-3770.json index 310cc95f06d..af1a6c04a35 100644 --- a/2020/3xxx/CVE-2020-3770.json +++ b/2020/3xxx/CVE-2020-3770.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3770", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer errors" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3770", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3771.json b/2020/3xxx/CVE-2020-3771.json index 9d7ff49b026..7040f724410 100644 --- a/2020/3xxx/CVE-2020-3771.json +++ b/2020/3xxx/CVE-2020-3771.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3771", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3771", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3772.json b/2020/3xxx/CVE-2020-3772.json index 5a0c276b699..de163e1ef5a 100644 --- a/2020/3xxx/CVE-2020-3772.json +++ b/2020/3xxx/CVE-2020-3772.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3772", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer errors" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3772", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3773.json b/2020/3xxx/CVE-2020-3773.json index 7f2d0d1f6fe..97065988c4e 100644 --- a/2020/3xxx/CVE-2020-3773.json +++ b/2020/3xxx/CVE-2020-3773.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3773", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds write" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3773", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3774.json b/2020/3xxx/CVE-2020-3774.json index 8de9f0f4e15..e635cb21d05 100644 --- a/2020/3xxx/CVE-2020-3774.json +++ b/2020/3xxx/CVE-2020-3774.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3774", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer errors" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3774", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3775.json b/2020/3xxx/CVE-2020-3775.json index f7181439497..d4aaaa73fc0 100644 --- a/2020/3xxx/CVE-2020-3775.json +++ b/2020/3xxx/CVE-2020-3775.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3775", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer errors" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3775", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3776.json b/2020/3xxx/CVE-2020-3776.json index 7c20ff2a44a..b733f50d932 100644 --- a/2020/3xxx/CVE-2020-3776.json +++ b/2020/3xxx/CVE-2020-3776.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3776", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer errors" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3776", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3777.json b/2020/3xxx/CVE-2020-3777.json index 2bbe15a6c22..6d780402631 100644 --- a/2020/3xxx/CVE-2020-3777.json +++ b/2020/3xxx/CVE-2020-3777.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3777", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3777", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3778.json b/2020/3xxx/CVE-2020-3778.json index c05ba566308..41b3090828b 100644 --- a/2020/3xxx/CVE-2020-3778.json +++ b/2020/3xxx/CVE-2020-3778.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3778", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop versions Photoshop CC 2019, and Photoshop 2020 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3778", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3779.json b/2020/3xxx/CVE-2020-3779.json index 63735dcff7a..77b1ce09ca0 100644 --- a/2020/3xxx/CVE-2020-3779.json +++ b/2020/3xxx/CVE-2020-3779.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3779", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds write" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3779", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3780.json b/2020/3xxx/CVE-2020-3780.json index 221e199563d..1d1e8da45fd 100644 --- a/2020/3xxx/CVE-2020-3780.json +++ b/2020/3xxx/CVE-2020-3780.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3780", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer errors" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3780", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3781.json b/2020/3xxx/CVE-2020-3781.json index 43e67ad48c8..df07312c2b4 100644 --- a/2020/3xxx/CVE-2020-3781.json +++ b/2020/3xxx/CVE-2020-3781.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3781", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3781", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3782.json b/2020/3xxx/CVE-2020-3782.json index b172debd88b..e1c67fc4ab0 100644 --- a/2020/3xxx/CVE-2020-3782.json +++ b/2020/3xxx/CVE-2020-3782.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3782", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3782", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3783.json b/2020/3xxx/CVE-2020-3783.json index 136a3c43188..dc5becc96ca 100644 --- a/2020/3xxx/CVE-2020-3783.json +++ b/2020/3xxx/CVE-2020-3783.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3783", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a heap corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3783", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3784.json b/2020/3xxx/CVE-2020-3784.json index 2bf7dab8976..07d43b61ba2 100644 --- a/2020/3xxx/CVE-2020-3784.json +++ b/2020/3xxx/CVE-2020-3784.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3784", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3784", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3785.json b/2020/3xxx/CVE-2020-3785.json index e055550a295..12887e17b9e 100644 --- a/2020/3xxx/CVE-2020-3785.json +++ b/2020/3xxx/CVE-2020-3785.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3785", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3785", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3786.json b/2020/3xxx/CVE-2020-3786.json index 3cb810f8a28..ec596ff75b6 100644 --- a/2020/3xxx/CVE-2020-3786.json +++ b/2020/3xxx/CVE-2020-3786.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3786", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3786", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3787.json b/2020/3xxx/CVE-2020-3787.json index 3316972fa30..18f10dc525d 100644 --- a/2020/3xxx/CVE-2020-3787.json +++ b/2020/3xxx/CVE-2020-3787.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3787", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3787", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3788.json b/2020/3xxx/CVE-2020-3788.json index 3d87f1227e7..ec5c377de44 100644 --- a/2020/3xxx/CVE-2020-3788.json +++ b/2020/3xxx/CVE-2020-3788.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3788", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3788", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3789.json b/2020/3xxx/CVE-2020-3789.json index 8587448e187..cb1b702efd6 100644 --- a/2020/3xxx/CVE-2020-3789.json +++ b/2020/3xxx/CVE-2020-3789.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3789", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3789", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3790.json b/2020/3xxx/CVE-2020-3790.json index 1a64958a110..ec22d436fcf 100644 --- a/2020/3xxx/CVE-2020-3790.json +++ b/2020/3xxx/CVE-2020-3790.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3790", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory corruption" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3790", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3791.json b/2020/3xxx/CVE-2020-3791.json index ea3805ee1c0..73aa115d465 100644 --- a/2020/3xxx/CVE-2020-3791.json +++ b/2020/3xxx/CVE-2020-3791.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-3791", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Photoshop CC 2019, and Photoshop 2020 versions" + } + ] + }, + "product_name": "Adobe Photoshop" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb20-14.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-3791", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5261.json b/2020/5xxx/CVE-2020-5261.json index 8713c335614..c67bcf47776 100644 --- a/2020/5xxx/CVE-2020-5261.json +++ b/2020/5xxx/CVE-2020-5261.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 has a faulty implementation of Token Replay Detection. Token Replay Detection is an important defence in depth measure for Single Sign On solutions. The 2.5.0 version is patched. Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use.\nSaml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 have a faulty implementation of Token Replay Detection.\n\nToken Replay Detection is an important defense measure for Single Sign On solutions.\n\nThe 2.5.0 version is patched. Note that version 1.0.1 and prior versions are not affected. These versions have a correct Token Replay Implementation and are safe to use." + "value": "Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 has a faulty implementation of Token Replay Detection. Token Replay Detection is an important defence in depth measure for Single Sign On solutions. The 2.5.0 version is patched. Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use. Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 have a faulty implementation of Token Replay Detection. Token Replay Detection is an important defense measure for Single Sign On solutions. The 2.5.0 version is patched. Note that version 1.0.1 and prior versions are not affected. These versions have a correct Token Replay Implementation and are safe to use." } ] }, diff --git a/2020/9xxx/CVE-2020-9274.json b/2020/9xxx/CVE-2020-9274.json index 0463fa18594..edc7f4d1cab 100644 --- a/2020/9xxx/CVE-2020-9274.json +++ b/2020/9xxx/CVE-2020-9274.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200228 [SECURITY] [DLA 2123-1] pure-ftpd security update", "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00029.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202003-54", + "url": "https://security.gentoo.org/glsa/202003-54" } ] } diff --git a/2020/9xxx/CVE-2020-9359.json b/2020/9xxx/CVE-2020-9359.json index 4697dd54360..f795847aebf 100644 --- a/2020/9xxx/CVE-2020-9359.json +++ b/2020/9xxx/CVE-2020-9359.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://kde.org/info/security/advisory-20200312-1.txt", "url": "https://kde.org/info/security/advisory-20200312-1.txt" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200325 [SECURITY] [DLA 2159-1] okular security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00033.html" } ] } diff --git a/2020/9xxx/CVE-2020-9365.json b/2020/9xxx/CVE-2020-9365.json index df4f849136b..41593192f79 100644 --- a/2020/9xxx/CVE-2020-9365.json +++ b/2020/9xxx/CVE-2020-9365.json @@ -56,6 +56,11 @@ "url": "https://github.com/jedisct1/pure-ftpd/commit/36c6d268cb190282a2c17106acfd31863121b58e", "refsource": "MISC", "name": "https://github.com/jedisct1/pure-ftpd/commit/36c6d268cb190282a2c17106acfd31863121b58e" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202003-54", + "url": "https://security.gentoo.org/glsa/202003-54" } ] } diff --git a/2020/9xxx/CVE-2020-9520.json b/2020/9xxx/CVE-2020-9520.json index 8fc15252719..ebc6f108463 100644 --- a/2020/9xxx/CVE-2020-9520.json +++ b/2020/9xxx/CVE-2020-9520.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9520", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@suse.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Micro Focus International", + "product": { + "product_data": [ + { + "product_name": "Micro Focus Vibe.", + "version": { + "version_data": [ + { + "version_value": "All Vibe version prior to Vive 4.0.7." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Stored XSS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://softwaresupport.softwaregrp.com/doc/KM03630475", + "url": "https://softwaresupport.softwaregrp.com/doc/KM03630475" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored XSS vulnerability was discovered in Micro Focus Vibe, affecting all Vibe version prior to 4.0.7. The vulnerability could allows a remote attacker to craft and store malicious content into Vibe such that when the content is viewed by another user of the system, attacker controlled JavaScript will execute in the security context of the target user\u2019s browser." } ] }