"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-05-28 20:01:31 +00:00
parent 73fa40206c
commit 4892866ca5
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 60 additions and 21 deletions

View File

@ -124,6 +124,11 @@
"refsource": "DEBIAN",
"name": "DSA-4680",
"url": "https://www.debian.org/security/2020/dsa-4680"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13661",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -89,6 +89,11 @@
"refsource": "DEBIAN",
"name": "DSA-4680",
"url": "https://www.debian.org/security/2020/dsa-4680"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"
}
]
},

View File

@ -239,6 +239,11 @@
"refsource": "DEBIAN",
"name": "DSA-4680",
"url": "https://www.debian.org/security/2020/dsa-4680"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"
}
]
},

View File

@ -1,10 +1,10 @@
{
"CVE_data_meta": {
"ASSIGNER": "secure@dell.com",
"DATE_PUBLIC": "2020-05-27",
"ID": "CVE-2020-5357",
"ASSIGNER": "secure@dell.com",
"DATE_PUBLIC": "2020-05-27",
"ID": "CVE-2020-5357",
"STATE": "PUBLIC"
},
},
"affects": {
"vendor": {
"vendor_data": [
@ -12,59 +12,60 @@
"product": {
"product_data": [
{
"product_name": "CPG BIOS",
"product_name": "CPG BIOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_affected": "<",
"version_value": "1.0.8"
}
]
}
}
]
},
},
"vendor_name": "Dell"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"lang": "eng",
"value": "Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time window, a locally authenticated low-privileged malicious user could exploit this vulnerability by tricking an administrator into overwriting arbitrary files via a symlink attack. The vulnerability does not affect the actual binary payload that the update utility delivers."
}
]
},
},
"impact": {
"cvss": {
"baseScore": 7.1,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"lang": "eng",
"value": "CWE-427: Uncontrolled Search Path Element"
}
]
}
]
},
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.dell.com/support/article/SLN321564"
"refsource": "MISC",
"url": "https://www.dell.com/support/article/SLN321564",
"name": "https://www.dell.com/support/article/SLN321564"
}
]
}

View File

@ -78,6 +78,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200528-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200528-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"
}
]
},