mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
784ab1a449
commit
539f90601c
@ -94,6 +94,11 @@
|
||||
"name": "https://pear.php.net/bugs/bug.php?id=23782",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://pear.php.net/bugs/bug.php?id=23782"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-14",
|
||||
"url": "https://security.gentoo.org/glsa/202006-14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1833",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1833"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-18",
|
||||
"url": "https://security.gentoo.org/glsa/202006-18"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update",
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/28"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2019-ad23a4522d",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IGOO5UGEBBDPN7B2YXLK7I7L3Y35EBA/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-23",
|
||||
"url": "https://security.gentoo.org/glsa/202006-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735494",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1735494"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-16",
|
||||
"url": "https://security.gentoo.org/glsa/202006-16"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-17",
|
||||
"url": "https://security.gentoo.org/glsa/202006-17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://android.googlesource.com/kernel/common/+/688078e7",
|
||||
"url": "http://android.googlesource.com/kernel/common/+/688078e7"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4388-1",
|
||||
"url": "https://usn.ubuntu.com/4388-1/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4385-1",
|
||||
"url": "https://usn.ubuntu.com/4385-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4388-1",
|
||||
"url": "https://usn.ubuntu.com/4388-1/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0694",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-15",
|
||||
"url": "https://security.gentoo.org/glsa/202006-15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0801",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4388-1",
|
||||
"url": "https://usn.ubuntu.com/4388-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0801",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4388-1",
|
||||
"url": "https://usn.ubuntu.com/4388-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0801",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4388-1",
|
||||
"url": "https://usn.ubuntu.com/4388-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4360-4",
|
||||
"url": "https://usn.ubuntu.com/4360-4/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-13",
|
||||
"url": "https://security.gentoo.org/glsa/202006-13"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-bc22f06aa3",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-15",
|
||||
"url": "https://security.gentoo.org/glsa/202006-15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14147",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-14147",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/antirez/redis/pull/6875",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/antirez/redis/pull/6875"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,81 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14148",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-14148",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/ngircd/ngircd/issues/274",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/ngircd/ngircd/issues/274"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ngircd/ngircd/issues/277",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/ngircd/ngircd/issues/277"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ngircd/ngircd/pull/275",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/ngircd/ngircd/pull/275"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ngircd/ngircd/pull/276",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/ngircd/ngircd/pull/276"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,71 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14149",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-14149",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/troglobit/uftpd/issues/30",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/troglobit/uftpd/issues/30"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.gentoo.org/726308",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.gentoo.org/726308"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/troglobit/uftpd/releases/tag/v2.12",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/troglobit/uftpd/releases/tag/v2.12"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
62
2020/14xxx/CVE-2020-14156.json
Normal file
62
2020/14xxx/CVE-2020-14156.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-14156",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "user_channel/passwd_mgr.cpp in OpenBMC phosphor-host-ipmid before 2020-04-03 does not ensure that /etc/ipmi-pass has strong file permissions."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/openbmc/phosphor-host-ipmid/commit/b265455a2518ece7c004b43c144199ec980fc620",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/openbmc/phosphor-host-ipmid/commit/b265455a2518ece7c004b43c144199ec980fc620"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2020/14xxx/CVE-2020-14157.json
Normal file
18
2020/14xxx/CVE-2020-14157.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14157",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2020/14xxx/CVE-2020-14158.json
Normal file
18
2020/14xxx/CVE-2020-14158.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14158",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,4 +1,3 @@
|
||||
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
@ -70,6 +69,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200122-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200122-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -113,6 +113,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -113,6 +113,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0800",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-22",
|
||||
"url": "https://security.gentoo.org/glsa/202006-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,6 +93,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html",
|
||||
"url": "http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-21",
|
||||
"url": "https://security.gentoo.org/glsa/202006-21"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user