"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-03-18 19:01:41 +00:00
parent d5b4c472c5
commit 2c7f8c3816
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
27 changed files with 545 additions and 108 deletions

View File

@ -48,6 +48,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391", "name": "https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391",
"url": "https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391" "url": "https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391"
},
{
"refsource": "MISC",
"name": "https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3",
"url": "https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3"
} }
] ]
}, },

View File

@ -76,6 +76,11 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"name": "46783", "name": "46783",
"url": "https://www.exploit-db.com/exploits/46783/" "url": "https://www.exploit-db.com/exploits/46783/"
},
{
"refsource": "MISC",
"name": "https://blog.certimetergroup.com/it/articolo/security/polyglot_phar_deserialization_to_rce",
"url": "https://blog.certimetergroup.com/it/articolo/security/polyglot_phar_deserialization_to_rce"
} }
] ]
} }

View File

@ -59,8 +59,8 @@
}, },
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-004.md", "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-004.md",
"url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-004.md" "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-004.md"
} }
] ]
} }

View File

@ -59,8 +59,8 @@
}, },
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-007.md", "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md",
"url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-007.md" "url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-006.md",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-006.md" "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-006.md",
"url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-006.md"
} }
] ]
} }

View File

@ -1,17 +1,66 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-12769",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2019-12769",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SolarWinds Serv-U Managed File Transfer (MFT) Web client before 15.1.6 Hotfix 2 is vulnerable to Cross-Site Request Forgery in the file upload functionality via ?Command=Upload with the Dir and File parameters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-1-6-HotFix-2",
"refsource": "MISC",
"name": "https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-1-6-HotFix-2"
},
{
"refsource": "MISC",
"name": "https://medium.com/@clod81/cve-2019-12769-solarwinds-serv-u-managed-file-transfer-mft-web-client-15-1-6-a2dab98d668d",
"url": "https://medium.com/@clod81/cve-2019-12769-solarwinds-serv-u-managed-file-transfer-mft-web-client-15-1-6-a2dab98d668d"
} }
] ]
} }

View File

@ -1,17 +1,66 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-12921",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2019-12921",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "In GraphicsMagick before 1.3.32, the text filename component allows remote attackers to read arbitrary files via a crafted image because of TranslateTextEx for SVG."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.graphicsmagick.org/",
"refsource": "MISC",
"name": "http://www.graphicsmagick.org/"
},
{
"refsource": "MISC",
"name": "https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md",
"url": "https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-008.md",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-008.md" "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-008.md",
"url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-008.md"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-010.md",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-010.md" "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-010.md",
"url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-010.md"
} }
] ]
} }

View File

@ -63,8 +63,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/security/en-us/details/539430/DSA-2019-155-Dell-EMC-Data-Protection-Advisor-Security-Update-for-Multiple-Vulnerabilities" "url": "https://www.dell.com/support/security/en-us/details/539430/DSA-2019-155-Dell-EMC-Data-Protection-Advisor-Security-Update-for-Multiple-Vulnerabilities",
"name": "https://www.dell.com/support/security/en-us/details/539430/DSA-2019-155-Dell-EMC-Data-Protection-Advisor-Security-Update-for-Multiple-Vulnerabilities"
} }
] ]
} }

View File

@ -63,8 +63,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/security/en-us/details/539430/DSA-2019-155-Dell-EMC-Data-Protection-Advisor-Security-Update-for-Multiple-Vulnerabilities" "url": "https://www.dell.com/support/security/en-us/details/539430/DSA-2019-155-Dell-EMC-Data-Protection-Advisor-Security-Update-for-Multiple-Vulnerabilities",
"name": "https://www.dell.com/support/security/en-us/details/539430/DSA-2019-155-Dell-EMC-Data-Protection-Advisor-Security-Update-for-Multiple-Vulnerabilities"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-012.md",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-012.md" "name": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-012.md",
"url": "https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-012.md"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e." "value": "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\""
} }
] ]
}, },

View File

@ -1,18 +1,76 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-20511",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2019-20511",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "ERPNext 11.1.47 allows blog?blog_category= Frame Injection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
} }
] ]
} }
]
},
"references": {
"reference_data": [
{
"url": "https://www.netsparker.com/web-applications-advisories/ns-19-018-frame-injection-in-erpnext/",
"refsource": "MISC",
"name": "https://www.netsparker.com/web-applications-advisories/ns-19-018-frame-injection-in-erpnext/"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:L/I:N/PR:N/S:C/UI:R",
"version": "3.0"
}
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-20512",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2019-20512",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Open edX Ironwood.1 allows support/certificates?course_id= reflected XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
} }
] ]
} }
]
},
"references": {
"reference_data": [
{
"url": "https://www.netsparker.com/web-applications-advisories/ns-19-014-reflected-cross-site-scripting-in-openedx/",
"refsource": "MISC",
"name": "https://www.netsparker.com/web-applications-advisories/ns-19-014-reflected-cross-site-scripting-in-openedx/"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"availabilityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AC:L/A:N/C:L/I:L/PR:N/S:C/UI:R",
"version": "3.0"
}
}
} }

View File

@ -1,18 +1,75 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-20528",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2019-20528",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp username parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
} }
] ]
} }
]
},
"references": {
"reference_data": [
{
"url": "https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/",
"refsource": "MISC",
"name": "https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"availabilityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AC:L/A:N/C:L/I:L/PR:N/S:C/UI:R",
"version": "3.0"
}
}
} }

View File

@ -63,8 +63,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/security/en-us/details/537007/DSA-2019-135-Dell-EMC-Data-Protection-Central-Improper-Chain-of-Trust-Vulnerability" "url": "https://www.dell.com/support/security/en-us/details/537007/DSA-2019-135-Dell-EMC-Data-Protection-Central-Improper-Chain-of-Trust-Vulnerability",
"name": "https://www.dell.com/support/security/en-us/details/537007/DSA-2019-135-Dell-EMC-Data-Protection-Central-Improper-Chain-of-Trust-Vulnerability"
} }
] ]
} }

View File

@ -61,6 +61,11 @@
"name": "https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b", "name": "https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b" "url": "https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b"
},
{
"refsource": "MISC",
"name": "https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903",
"url": "https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html", "name": "http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html" "url": "http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "https://blog.certimetergroup.com/it/articolo/security/CMS_Made_Simple_deserialization_attack_%28CVE-2019-9055%29",
"url": "https://blog.certimetergroup.com/it/articolo/security/CMS_Made_Simple_deserialization_attack_%28CVE-2019-9055%29"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Citrix Gateway 11.1, 12.0, and 12.1 has an Inconsistent Interpretation of HTTP Requests." "value": "** DISPUTED ** Citrix Gateway 11.1, 12.0, and 12.1 has an Inconsistent Interpretation of HTTP Requests. NOTE: Citrix disputes the reported behavior as not a security issue. Citrix ADC only caches HTTP/1.1 traffic for performance optimization."
} }
] ]
}, },

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Citrix Gateway 11.1, 12.0, and 12.1 allows Cache Poisoning." "value": "** DISPUTED ** Citrix Gateway 11.1, 12.0, and 12.1 allows Cache Poisoning. NOTE: Citrix disputes this as not a vulnerability. By default, Citrix ADC only caches static content served under certain URL paths for Citrix Gateway usage. No dynamic content is served under these paths, which implies that those cached pages would not change based on parameter values. All other data traffic going through Citrix Gateway are NOT cached by default."
} }
] ]
}, },

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10661",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10662",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10663",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10664",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-10665",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Docker Desktop allows local privilege escalation to NT AUTHORITY\\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Desktop for Windows Stable before 2.2.0.4, and Docker Desktop for Windows Edge before 2.2.2.0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md",
"refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md"
},
{
"url": "https://docs.docker.com/release-notes/",
"refsource": "MISC",
"name": "https://docs.docker.com/release-notes/"
}
]
}
}

View File

@ -56,6 +56,11 @@
"url": "https://seclists.org/fulldisclosure/2020/Feb/18", "url": "https://seclists.org/fulldisclosure/2020/Feb/18",
"refsource": "MISC", "refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2020/Feb/18" "name": "https://seclists.org/fulldisclosure/2020/Feb/18"
},
{
"refsource": "MISC",
"name": "https://blog.certimetergroup.com/it/articolo/security/smartclient-v12-xml-external-entity--cve-2020-9352",
"url": "https://blog.certimetergroup.com/it/articolo/security/smartclient-v12-xml-external-entity--cve-2020-9352"
} }
] ]
} }