"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-08-17 20:01:35 +00:00
parent f6463c192e
commit 393c9db673
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
9 changed files with 1595 additions and 1565 deletions

View File

@ -61,6 +61,11 @@
"url": "https://github.com/bludit/bludit/pull/1090",
"refsource": "MISC",
"name": "https://github.com/bludit/bludit/pull/1090"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Bruteforce-Mitigation-Bypass.html",
"url": "http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Bruteforce-Mitigation-Bypass.html"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Visual Studio Code when it process environment variables after opening a project, aka \u0027Visual Studio Code Remote Code Execution Vulnerability\u0027."
"value": "A remote code execution vulnerability exists in Visual Studio Code when it process environment variables after opening a project, aka 'Visual Studio Code Remote Code Execution Vulnerability'."
}
]
},
@ -53,7 +53,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0604"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0604",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0604"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-03",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-03"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158888/Geutebruck-testaction.cgi-Remote-Command-Execution.html",
"url": "http://packetstormsecurity.com/files/158888/Geutebruck-testaction.cgi-Remote-Command-Execution.html"
}
]
},

View File

@ -464,7 +464,7 @@
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists when Microsoft .NET Framework processes input, aka \u0027.NET Framework Remote Code Execution Vulnerability\u0027."
"value": "A remote code execution vulnerability exists when Microsoft .NET Framework processes input, aka '.NET Framework Remote Code Execution Vulnerability'."
}
]
},
@ -483,7 +483,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1046"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1046",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1046"
}
]
}

View File

@ -836,6 +836,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html",
"url": "http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11, aka \u0027Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability\u0027."
"value": "A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11, aka 'Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability'."
}
]
},
@ -53,7 +53,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1182"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1182",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1182"
}
]
}

View File

@ -464,7 +464,7 @@
"description_data": [
{
"lang": "eng",
"value": "An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka \u0027Windows Print Spooler Elevation of Privilege Vulnerability\u0027."
"value": "An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'."
}
]
},
@ -483,7 +483,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1337"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1337",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1337"
}
]
}

View File

@ -464,7 +464,7 @@
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects, aka \u0027Windows Media Remote Code Execution Vulnerability\u0027."
"value": "A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects, aka 'Windows Media Remote Code Execution Vulnerability'."
}
]
},
@ -483,7 +483,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1339"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1339",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1339"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200716 [jira] [Updated] (OFBIZ-11716) Apache OFBiz unsafe deserialization of XMLRPC arguments (CVE-2020-9496)",
"url": "https://lists.apache.org/thread.html/rde93e1c91620335b72b798f78ab4459d3f7b06f96031d8ce86a18825@%3Cnotifications.ofbiz.apache.org%3E"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html",
"url": "http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html"
}
]
},