Merge pull request #303 from CVEProject/master

XFA Rebase
This commit is contained in:
Scott Moore 2020-07-27 09:27:23 -04:00 committed by GitHub
commit 86c6298402
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
370 changed files with 5894 additions and 244 deletions

View File

@ -116,6 +116,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-01",
"url": "https://security.gentoo.org/glsa/202007-01"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200604 [SECURITY] [DLA 2234-1] netqmail security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-01",
"url": "https://security.gentoo.org/glsa/202007-01"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200604 [SECURITY] [DLA 2234-1] netqmail security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-01",
"url": "https://security.gentoo.org/glsa/202007-01"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "MS14-019",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-019"
},
{
"refsource": "FULLDISC",
"name": "20200724 Defense in depth -- the Microsoft way (part 70): CVE-2014-0315 alias MS14-019 revisited",
"url": "http://seclists.org/fulldisclosure/2020/Jul/33"
}
]
}

View File

@ -101,6 +101,11 @@
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211289",
"url": "https://support.apple.com/kb/HT211289"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "DSA-3551",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3551"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-20",
"url": "https://security.gentoo.org/glsa/202007-20"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "[oss-security] 20160118 Buffer Overflow in lha compression utility",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/01/18/3"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-42",
"url": "https://security.gentoo.org/glsa/202007-42"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0793",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-05",
"url": "https://security.gentoo.org/glsa/202007-05"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0554",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-43",
"url": "https://security.gentoo.org/glsa/202007-43"
}
]
}

View File

@ -78,6 +78,11 @@
"name": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899",
"refsource": "CONFIRM",
"url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-37",
"url": "https://security.gentoo.org/glsa/202007-37"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191110 [SECURITY] [DLA 1986-1] ruby-haml security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-27",
"url": "https://security.gentoo.org/glsa/202007-27"
}
]
},

View File

@ -76,6 +76,16 @@
"name": "https://lists.nic.cz/pipermail/knot-dns-users/2017-June/001144.html",
"refsource": "MISC",
"url": "https://lists.nic.cz/pipermail/knot-dns-users/2017-June/001144.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1086",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1085",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00076.html"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://github.com/jbeder/yaml-cpp/issues/519",
"refsource": "MISC",
"url": "https://github.com/jbeder/yaml-cpp/issues/519"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-14",
"url": "https://security.gentoo.org/glsa/202007-14"
}
]
}

View File

@ -89,6 +89,11 @@
"refsource": "UBUNTU",
"name": "USN-4199-1",
"url": "https://usn.ubuntu.com/4199-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4199-2",
"url": "https://usn.ubuntu.com/4199-2/"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://github.com/Icinga/icinga-core/issues/1601",
"refsource": "MISC",
"url": "https://github.com/Icinga/icinga-core/issues/1601"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-31",
"url": "https://security.gentoo.org/glsa/202007-31"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1025",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1056",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html"
}
]
}

View File

@ -81,6 +81,11 @@
"name": "[qemu-devel] 20170606 [PATCH 4/7] megasas: do not read DCMD opcode more than once",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-3ef028d53f",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CD3GLZ5URIK74RCGLSH72IVLDIJJMLQC/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-07",
"url": "https://security.gentoo.org/glsa/202007-07"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "[salt-users] 20181024 2017.7.8 Released - Security Advisory",
"refsource": "MLIST",
"url": "https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1074",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "[salt-users] 20181024 2017.7.8 Released - Security Advisory",
"refsource": "MLIST",
"url": "https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1074",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=699686",
"refsource": "MISC",
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=699686"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200725 [SECURITY] [DLA 2289-1] mupdf security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=699685",
"refsource": "MISC",
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=699685"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200725 [SECURITY] [DLA 2289-1] mupdf security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://github.com/TeamSeri0us/pocs/tree/master/mupdf",
"refsource": "MISC",
"url": "https://github.com/TeamSeri0us/pocs/tree/master/mupdf"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200725 [SECURITY] [DLA 2289-1] mupdf security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-73274c9df4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-19",
"url": "https://security.gentoo.org/glsa/202007-19"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-73274c9df4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-19",
"url": "https://security.gentoo.org/glsa/202007-19"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1025",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1056",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1547879",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547879"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-44",
"url": "https://security.gentoo.org/glsa/202007-44"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "DSA-4129",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4129"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-44",
"url": "https://security.gentoo.org/glsa/202007-44"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1547885",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547885"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-44",
"url": "https://security.gentoo.org/glsa/202007-44"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "DSA-4129",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4129"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-44",
"url": "https://security.gentoo.org/glsa/202007-44"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "DSA-4129",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4129"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-44",
"url": "https://security.gentoo.org/glsa/202007-44"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://caml.inria.fr/mantis/view.php?id=7765",
"refsource": "MISC",
"url": "https://caml.inria.fr/mantis/view.php?id=7765"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-48",
"url": "https://security.gentoo.org/glsa/202007-48"
}
]
}

View File

@ -89,6 +89,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-bfb407659e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-29",
"url": "https://security.gentoo.org/glsa/202007-29"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-17",
"url": "https://security.gentoo.org/glsa/202007-17"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-17",
"url": "https://security.gentoo.org/glsa/202007-17"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-73274c9df4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-19",
"url": "https://security.gentoo.org/glsa/202007-19"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "DEBIAN",
"name": "DSA-4665",
"url": "https://www.debian.org/security/2020/dsa-4665"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "UBUNTU",
"name": "USN-4336-1",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-10f02ad597",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUXKCY35PKC32IFHN4RBUCZ75OWEYVJH/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200725 [SECURITY] [DLA 2289-1] mupdf security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "DEBIAN",
"name": "DSA-4722",
"url": "https://www.debian.org/security/2020/dsa-4722"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200727 [SECURITY] [DLA 2291-1] ffmpeg security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00022.html"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0716",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "UBUNTU",
"name": "USN-4336-1",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-6bc8be9d84",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-36",
"url": "https://security.gentoo.org/glsa/202007-36"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-6bc8be9d84",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-36",
"url": "https://security.gentoo.org/glsa/202007-36"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-6bc8be9d84",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-36",
"url": "https://security.gentoo.org/glsa/202007-36"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-6bc8be9d84",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-36",
"url": "https://security.gentoo.org/glsa/202007-36"
}
]
}

View File

@ -78,6 +78,11 @@
"refsource": "UBUNTU",
"name": "USN-4407-1",
"url": "https://usn.ubuntu.com/4407-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1071",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.html"
}
]
},

View File

@ -66,6 +66,11 @@
"refsource": "UBUNTU",
"name": "USN-4336-1",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "UBUNTU",
"name": "USN-4336-1",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "DEBIAN",
"name": "DSA-4722",
"url": "https://www.debian.org/security/2020/dsa-4722"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200727 [SECURITY] [DLA 2291-1] ffmpeg security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00022.html"
}
]
}

View File

@ -111,6 +111,11 @@
"refsource": "DEBIAN",
"name": "DSA-4663",
"url": "https://www.debian.org/security/2020/dsa-4663"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-35",
"url": "https://security.gentoo.org/glsa/202007-35"
}
]
}

View File

@ -15,11 +15,11 @@
"product": {
"product_data": [
{
"product_name": "OSIsoft PI Vision",
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "PI Vision 2017 R2, PI Vision 2017 R2 SP1, PI Vision 2019"
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
@ -36,7 +36,7 @@
"description": [
{
"lang": "eng",
"value": "INCLUSION OF SENSITIVE INFORMATION IN LOG FILES CWE-532"
"value": "INSERTION OF SENSITIVE INFORMATION INTO LOG FILE CWE-532"
}
]
}
@ -46,8 +46,8 @@
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-014-06",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-014-06"
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
@ -55,7 +55,7 @@
"description_data": [
{
"lang": "eng",
"value": "OSIsoft PI Vision, PI Vision 2017 R2, PI Vision 2017 R2 SP1, PI Vision 2019. The affected product records the service account password in the installation log files when a non-default service account and password are specified during installation or upgrade."
"value": "In OSIsoft PI System multiple products and versions, a local attacker could view sensitive information in log files when service accounts are customized during installation or upgrade of PI Vision. The update fixes a previously reported issue."
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18834",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Persistent XSS in the WooCommerce Subscriptions plugin before 2.6.3 for WordPress allows remote attackers to execute arbitrary JavaScript because Billing Details are mishandled in WCS_Admin_Post_Types in class-wcs-admin-post-types.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.precursorsecurity.com/blog",
"refsource": "MISC",
"name": "https://www.precursorsecurity.com/blog"
},
{
"url": "https://woocommerce.com/products/woocommerce-subscriptions/",
"refsource": "MISC",
"name": "https://woocommerce.com/products/woocommerce-subscriptions/"
},
{
"refsource": "MISC",
"name": "https://www.precursorsecurity.com/blog/woocommerce-subscriptions-persistent-xss-cve-2019-18834",
"url": "https://www.precursorsecurity.com/blog/woocommerce-subscriptions-persistent-xss-cve-2019-18834"
}
]
}
}

View File

@ -91,6 +91,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0140",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00063.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-32",
"url": "https://security.gentoo.org/glsa/202007-32"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "UBUNTU",
"name": "USN-4242-1",
"url": "https://usn.ubuntu.com/4242-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-22",
"url": "https://security.gentoo.org/glsa/202007-22"
}
]
}

View File

@ -66,6 +66,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-26",
"url": "https://security.gentoo.org/glsa/202007-26"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "UBUNTU",
"name": "USN-4372-1",
"url": "https://usn.ubuntu.com/4372-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1025",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1056",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1025",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1056",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-dfb11916cc",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e9251de272",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/"
}
]
}

View File

@ -92,6 +92,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-bfb407659e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-29",
"url": "https://security.gentoo.org/glsa/202007-29"
}
]
}

View File

@ -92,6 +92,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-bfb407659e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-29",
"url": "https://security.gentoo.org/glsa/202007-29"
}
]
}

View File

@ -92,6 +92,11 @@
"name": "[debian-lts-announce] 20190130 [SECURITY] [DLA 1649-1] spice security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00026.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-30",
"url": "https://security.gentoo.org/glsa/202007-30"
}
]
}

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-4209",
"ASSIGNER": "psirt@us.ibm.com",
"ASSIGNER": "psirt@hcl.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-4301",
"ASSIGNER": "psirt@us.ibm.com",
"ASSIGNER": "psirt@hcl.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ASSIGNER": "psirt@hcl.com",
"ID": "CVE-2019-4388",
"STATE": "PUBLIC"
},

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-4392",
"ASSIGNER": "psirt@us.ibm.com",
"ASSIGNER": "psirt@hcl.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-4409",
"ASSIGNER": "psirt@us.ibm.com",
"ASSIGNER": "psirt@hcl.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -73,6 +73,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200324 [SECURITY] [DLA 2156-1] e2fsprogs security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200726 [SECURITY] [DLA 2290-1] e2fsprogs security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-d109db9c8a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7WUJWTJA55ILACKLTJFSQUYEBHVYENL/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-51",
"url": "https://security.gentoo.org/glsa/202007-51"
}
]
},

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190628 [SECURITY] [DLA 1838-1] mupdf security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00027.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200725 [SECURITY] [DLA 2289-1] mupdf security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-59",
"url": "https://security.gentoo.org/glsa/202003-59"
},
{
"refsource": "UBUNTU",
"name": "USN-4199-2",
"url": "https://usn.ubuntu.com/4199-2/"
}
]
},

View File

@ -113,6 +113,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-085150ac6e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO2VTHD7OLPJDCJBHKUQTBAHZOBBCF6X/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-05",
"url": "https://security.gentoo.org/glsa/202007-05"
}
]
},

View File

@ -103,6 +103,11 @@
"refsource": "GENTOO",
"name": "GLSA-202003-59",
"url": "https://security.gentoo.org/glsa/202003-59"
},
{
"refsource": "UBUNTU",
"name": "USN-4199-2",
"url": "https://usn.ubuntu.com/4199-2/"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "REDHAT",
"name": "RHBA-2019:3723",
"url": "https://access.redhat.com/errata/RHBA-2019:3723"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-45",
"url": "https://security.gentoo.org/glsa/202007-45"
}
]
}

View File

@ -63,6 +63,11 @@
"refsource": "UBUNTU",
"name": "USN-4396-1",
"url": "https://usn.ubuntu.com/4396-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-05",
"url": "https://security.gentoo.org/glsa/202007-05"
}
]
},

View File

@ -81,6 +81,11 @@
"refsource": "UBUNTU",
"name": "USN-4308-1",
"url": "https://usn.ubuntu.com/4308-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-24",
"url": "https://security.gentoo.org/glsa/202007-24"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "UBUNTU",
"name": "USN-4308-1",
"url": "https://usn.ubuntu.com/4308-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-24",
"url": "https://security.gentoo.org/glsa/202007-24"
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10600",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL POINTER DEREFERENCE CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Archive Subsystem when the subsystem is working under memory pressure. This can result in blocking queries to PI Data Archive."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10602",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL POINTER DEREFERENCE CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Network Manager due to a race condition. This can result in blocking connections and queries to PI Data Archive."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10604",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "UNCAUGHT EXCEPTION CWE-248"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In OSIsoft PI System multiple products and versions, a remote, unauthenticated attacker could crash PI Network Manager service through specially crafted requests. This can result in blocking connections and queries to PI Data Archive."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10606",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "INCORRECT DEFAULT PERMISSIONS CWE-276"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10608",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10610",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "UNCONTROLLED SEARCH PATH ELEMENT CWE-427"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10614",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OSIsoft PI System multiple products and versions",
"version": {
"version_data": [
{
"version_value": "OSIsoft PI System multiple products and versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In OSIsoft PI System multiple products and versions, an authenticated remote attacker with write access to PI Vision databases could inject code into a display. Unauthorized information disclosure, deletion, or modification is possible if a victim views the infected display."
}
]
}

View File

@ -79,6 +79,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1023",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-15",
"url": "https://security.gentoo.org/glsa/202007-15"
}
]
},

View File

@ -53,6 +53,11 @@
"url": "https://git.qemu.org/?p=qemu.git;a=commit;h=de0b1bae6461f67243282555475f88b2384a1eb9",
"name": "https://git.qemu.org/?p=qemu.git;a=commit;h=de0b1bae6461f67243282555475f88b2384a1eb9",
"refsource": "CONFIRM"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200724-0007/",
"url": "https://security.netapp.com/advisory/ntap-20200724-0007/"
}
]
},
@ -74,4 +79,4 @@
]
]
}
}
}

View File

@ -74,6 +74,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1023",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-15",
"url": "https://security.gentoo.org/glsa/202007-15"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1023",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-15",
"url": "https://security.gentoo.org/glsa/202007-15"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1023",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-15",
"url": "https://security.gentoo.org/glsa/202007-15"
}
]
},

View File

@ -53,6 +53,16 @@
"url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1049",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1050",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "DEBIAN",
"name": "DSA-4728",
"url": "https://www.debian.org/security/2020/dsa-4728"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html"
}
]
},

View File

@ -73,6 +73,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1023",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-15",
"url": "https://security.gentoo.org/glsa/202007-15"
}
]
},

View File

@ -73,6 +73,11 @@
"name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c",
"refsource": "CONFIRM",
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1090",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"
}
]
},

View File

@ -73,6 +73,11 @@
"name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw",
"refsource": "CONFIRM",
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1090",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"
}
]
},

View File

@ -73,6 +73,11 @@
"name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh",
"refsource": "CONFIRM",
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1090",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"
}
]
},

View File

@ -118,6 +118,16 @@
"refsource": "CONFIRM",
"name": "https://www.drupal.org/sa-core-2020-002",
"url": "https://www.drupal.org/sa-core-2020-002"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1060",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-03",
"url": "https://security.gentoo.org/glsa/202007-03"
}
]
},

View File

@ -108,6 +108,16 @@
"name": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released",
"refsource": "MISC",
"url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1060",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-03",
"url": "https://security.gentoo.org/glsa/202007-03"
}
]
},

View File

@ -73,6 +73,11 @@
"name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g",
"refsource": "CONFIRM",
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1090",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"
}
]
},

View File

@ -73,6 +73,11 @@
"name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq",
"refsource": "CONFIRM",
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1090",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"
}
]
},

Some files were not shown because too many files have changed in this diff Show More