"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-06-25 18:01:29 +00:00
parent 09480e1627
commit 06b251bed7
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 37 additions and 4 deletions

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/",
"url": "https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html"
}
]
}

View File

@ -66,6 +66,11 @@
"url": "https://github.com/troglobit/uftpd/releases/tag/v2.12",
"refsource": "MISC",
"name": "https://github.com/troglobit/uftpd/releases/tag/v2.12"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0865",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-15299",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -245,6 +245,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158222/Windows-Print-Spooler-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/158222/Windows-Print-Spooler-Privilege-Escalation.html"
}
]
}

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514.\n\nSee also CVE-2020-7355, which describes a similar issue, but involving the generated 'notes' field of a discovered scan asset."
"value": "Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7355, which describes a similar issue, but involving the generated 'notes' field of a discovered scan asset."
}
]
},
@ -102,4 +102,4 @@
"source": {
"discovery": "EXTERNAL"
}
}
}

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514.\n\nSee also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset."
"value": "Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset."
}
]
},
@ -102,4 +102,4 @@
"source": {
"discovery": "EXTERNAL"
}
}
}