From 38b202300e80c2a4bcb7d43366893c0598fb14e9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 12 May 2020 22:01:15 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15253.json | 5 +++++ 2019/3xxx/CVE-2019-3999.json | 5 +++++ 2020/0xxx/CVE-2020-0987.json | 5 +++++ 2020/11xxx/CVE-2020-11530.json | 5 +++++ 2020/11xxx/CVE-2020-11651.json | 5 +++++ 2020/11xxx/CVE-2020-11652.json | 5 +++++ 2020/6xxx/CVE-2020-6651.json | 5 +++++ 2020/6xxx/CVE-2020-6652.json | 5 +++++ 8 files changed, 40 insertions(+) diff --git a/2019/15xxx/CVE-2019-15253.json b/2019/15xxx/CVE-2019-15253.json index b1c1a753c0e..27264c881bf 100644 --- a/2019/15xxx/CVE-2019-15253.json +++ b/2019/15xxx/CVE-2019-15253.json @@ -76,6 +76,11 @@ "name": "20200205 Cisco Digital Network Architecture Center Stored Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190205-dnac-xss" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157668/Cisco-Digital-Network-Architecture-Center-1.3.1.4-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/157668/Cisco-Digital-Network-Architecture-Center-1.3.1.4-Cross-Site-Scripting.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3999.json b/2019/3xxx/CVE-2019-3999.json index 44d16f766a8..16c772ac8a2 100644 --- a/2019/3xxx/CVE-2019-3999.json +++ b/2019/3xxx/CVE-2019-3999.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157493/Druva-inSync-Windows-Client-6.5.2-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/157493/Druva-inSync-Windows-Client-6.5.2-Privilege-Escalation.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157680/Druva-inSync-inSyncCPHwnet64.exe-RPC-Type-5-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/157680/Druva-inSync-inSyncCPHwnet64.exe-RPC-Type-5-Privilege-Escalation.html" } ] }, diff --git a/2020/0xxx/CVE-2020-0987.json b/2020/0xxx/CVE-2020-0987.json index 26bf46df23f..ce378bc201c 100644 --- a/2020/0xxx/CVE-2020-0987.json +++ b/2020/0xxx/CVE-2020-0987.json @@ -245,6 +245,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0987", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0987" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-647/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-647/" } ] } diff --git a/2020/11xxx/CVE-2020-11530.json b/2020/11xxx/CVE-2020-11530.json index db8212cb86b..6b4367404ba 100644 --- a/2020/11xxx/CVE-2020-11530.json +++ b/2020/11xxx/CVE-2020-11530.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html", "url": "http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html" } ] } diff --git a/2020/11xxx/CVE-2020-11651.json b/2020/11xxx/CVE-2020-11651.json index 8ba10f8f6ab..c77dc132c5e 100644 --- a/2020/11xxx/CVE-2020-11651.json +++ b/2020/11xxx/CVE-2020-11651.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "http://www.vmware.com/security/advisories/VMSA-2020-0009.html", "url": "http://www.vmware.com/security/advisories/VMSA-2020-0009.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html" } ] } diff --git a/2020/11xxx/CVE-2020-11652.json b/2020/11xxx/CVE-2020-11652.json index 2400043f4b5..13e3fea0eb6 100644 --- a/2020/11xxx/CVE-2020-11652.json +++ b/2020/11xxx/CVE-2020-11652.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "http://www.vmware.com/security/advisories/VMSA-2020-0009.html", "url": "http://www.vmware.com/security/advisories/VMSA-2020-0009.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html" } ] } diff --git a/2020/6xxx/CVE-2020-6651.json b/2020/6xxx/CVE-2020-6651.json index 1f1d328c4a1..1198073e1a2 100644 --- a/2020/6xxx/CVE-2020-6651.json +++ b/2020/6xxx/CVE-2020-6651.json @@ -84,6 +84,11 @@ "refsource": "MISC", "url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-vulnerability-advisory-intelligent-power-manager-v1-1.pdf", "name": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-vulnerability-advisory-intelligent-power-manager-v1-1.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-649/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-649/" } ] }, diff --git a/2020/6xxx/CVE-2020-6652.json b/2020/6xxx/CVE-2020-6652.json index bdae0867633..31febe9fc29 100644 --- a/2020/6xxx/CVE-2020-6652.json +++ b/2020/6xxx/CVE-2020-6652.json @@ -84,6 +84,11 @@ "refsource": "MISC", "url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-vulnerability-advisory-intelligent-power-manager-v1-1.pdf", "name": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-vulnerability-advisory-intelligent-power-manager-v1-1.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-650/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-650/" } ] },