mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 10:18:17 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8c9ce37455
commit
6922f34c51
@ -107,6 +107,11 @@
|
||||
"name": "https://www.samba.org/samba/security/CVE-2018-16851.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.samba.org/samba/security/CVE-2018-16851.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202003-52",
|
||||
"url": "https://security.gentoo.org/glsa/202003-52"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -129,6 +129,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/HT210353",
|
||||
"url": "https://support.apple.com/HT210353"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202003-52",
|
||||
"url": "https://security.gentoo.org/glsa/202003-52"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,11 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202003-52",
|
||||
"url": "https://security.gentoo.org/glsa/202003-52"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -94,6 +94,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2019-11dddb785b",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202003-52",
|
||||
"url": "https://security.gentoo.org/glsa/202003-52"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -89,6 +89,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-f92cd0e72b",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202003-52",
|
||||
"url": "https://security.gentoo.org/glsa/202003-52"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -89,6 +89,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-f92cd0e72b",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202003-52",
|
||||
"url": "https://security.gentoo.org/glsa/202003-52"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2020/10xxx/CVE-2020-10951.json
Normal file
18
2020/10xxx/CVE-2020-10951.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-10951",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -35,7 +35,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "PrestaShop module ps_facetedsearch versions before 3.5.0 has a reflected XSS with `url_name` parameter.\n\nThe problem is fixed in 3.5.0"
|
||||
"value": "PrestaShop module ps_facetedsearch versions before 3.5.0 has a reflected XSS with `url_name` parameter. The problem is fixed in 3.5.0"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -35,7 +35,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Nick Chan Bot before version 1.0.0-beta there is a vulnerability in the `npm` command which is part of this software package.\n\nThis allows arbitrary shell execution,which can compromise the bot\n\nThis is patched in version 1.0.0-beta"
|
||||
"value": "In Nick Chan Bot before version 1.0.0-beta there is a vulnerability in the `npm` command which is part of this software package. This allows arbitrary shell execution,which can compromise the bot This is patched in version 1.0.0-beta"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -85,4 +85,4 @@
|
||||
"advisory": "GHSA-8xwp-r7pj-cgw3",
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user