mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
029b7b98a2
commit
0d80100bee
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20200227 Re: Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2020/02/27/2"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064)",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/26"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -356,6 +356,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20200208 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
|
||||
"url": "https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20200228 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
|
||||
"url": "https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,7 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-13767",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
@ -74,6 +74,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4606",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4606"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156563/Chrome-DesktopMediaPickerController-WebContentsDestroyed-Use-After-Free.html",
|
||||
"url": "http://packetstormsecurity.com/files/156563/Chrome-DesktopMediaPickerController-WebContentsDestroyed-Use-After-Free.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -278,6 +278,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[logging-log4j-user] 20200224 Apache Log4j - Migration activity to 2.12.1 version - Request to support for the queries posted",
|
||||
"url": "https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e@%3Clog4j-user.logging.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20200228 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
|
||||
"url": "https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497",
|
||||
"url": "https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 CVE-2020-5497 - MITREid Connect XSS",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20200224 Local information disclosure in OpenSMTPD (CVE-2020-8793)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2020/02/24/4"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 Local information disclosure in OpenSMTPD (CVE-2020-8793)",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/28"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4634",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4634"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/32"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156472/AVIRA-Generic-Malformed-Container-Bypass.html",
|
||||
"url": "http://packetstormsecurity.com/files/156472/AVIRA-Generic-Malformed-Container-Bypass.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 [TZO-19-2020] - AVIRA Generic AV Bypass (ISO Container) - CVE-2020-9320",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/31"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html",
|
||||
"url": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 [TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/33"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user