From 1b968d00dec5547b9910b4cbdc8f87dc2db6bb36 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 20 Feb 2020 05:01:18 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/1xxx/CVE-2019-1950.json | 11 +++++------ 2020/8xxx/CVE-2020-8840.json | 5 +++++ 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/2019/1xxx/CVE-2019-1950.json b/2019/1xxx/CVE-2019-1950.json index 4dc3008390a..a6865ca15ed 100644 --- a/2019/1xxx/CVE-2019-1950.json +++ b/2019/1xxx/CVE-2019-1950.json @@ -10,6 +10,7 @@ "vendor": { "vendor_data": [ { + "vendor_name": "Cisco", "product": { "product_data": [ { @@ -17,15 +18,13 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_value": "16.11" + "version_value": "16.11 and earlier" } ] } } ] - }, - "vendor_name": "Cisco" + } } ] } @@ -37,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, local attacker to gain unauthorized access to an affected device.\n\nThe vulnerability is due to the existence of default credentials within the default configuration of an affected device. An attacker who has access to an affected device could log in with elevated privileges. A successful exploit could allow the attacker to take complete control of the device.\n\nThis vulnerability affects Cisco devices that are running Cisco IOS XE SD-WAN Software releases 16.11 and earlier.\n\n" + "value": "A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, local attacker to gain unauthorized access to an affected device. The vulnerability is due to the existence of default credentials within the default configuration of an affected device. An attacker who has access to an affected device could log in with elevated privileges. A successful exploit could allow the attacker to take complete control of the device. This vulnerability affects Cisco devices that are running Cisco IOS XE SD-WAN Software releases 16.11 and earlier." } ] }, @@ -106,4 +105,4 @@ "value": "To check for the presence of default credentials, customers can use the show running-configuration | include username admin command within the Cisco IOS XE SD-WAN Software command line. To remove the default credentials, customers can use the config-transaction and no username admin commands.\n\n" } ] -} +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8840.json b/2020/8xxx/CVE-2020-8840.json index fcb0801908d..c0362a44f4f 100644 --- a/2020/8xxx/CVE-2020-8840.json +++ b/2020/8xxx/CVE-2020-8840.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[druid-commits] 20200219 [GitHub] [druid] ccaominh opened a new pull request #9379: Suppress CVE-2020-8840 for htrace-core-4.0.1", "url": "https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20200219 [GitHub] [druid] suneet-s commented on issue #9379: Suppress CVE-2020-8840 for htrace-core-4.0.1", + "url": "https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E" } ] }