"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-13 10:01:58 +00:00
parent 6e314817b9
commit a235929b6f
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
9 changed files with 61 additions and 14 deletions

View File

@ -62,6 +62,11 @@
"name": "https://cgit.freedesktop.org/spice/linux/vd_agent/commit/?id=8ba174816d245757e743e636df357910e1d5eb61",
"refsource": "CONFIRM",
"url": "https://cgit.freedesktop.org/spice/linux/vd_agent/commit/?id=8ba174816d245757e743e636df357910e1d5eb61"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"
}
]
}

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/11/04/1",
"url": "https://www.openwall.com/lists/oss-security/2020/11/04/1"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1886359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886359"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1886366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886366"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1886372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886372"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5633",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv21-002.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv21-002.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv21-002.html"
},
{
"url": "https://www.support.nec.co.jp/View.aspx?id=9010108754"
"url": "https://www.support.nec.co.jp/View.aspx?id=9010108754",
"refsource": "MISC",
"name": "https://www.support.nec.co.jp/View.aspx?id=9010108754"
},
{
"url": "https://jvn.jp/en/jp/JVN38752718/index.html"
"url": "https://jvn.jp/en/jp/JVN38752718/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN38752718/index.html"
}
]
},
@ -62,4 +69,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5685",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.necplatforms.co.jp/en/press/security_adv.html"
"url": "https://www.necplatforms.co.jp/en/press/security_adv.html",
"refsource": "MISC",
"name": "https://www.necplatforms.co.jp/en/press/security_adv.html"
},
{
"url": "https://jvn.jp/en/jp/JVN38784555/index.html"
"url": "https://jvn.jp/en/jp/JVN38784555/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN38784555/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5686",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.necplatforms.co.jp/en/press/security_adv.html"
"url": "https://www.necplatforms.co.jp/en/press/security_adv.html",
"refsource": "MISC",
"name": "https://www.necplatforms.co.jp/en/press/security_adv.html"
},
{
"url": "https://jvn.jp/en/jp/JVN38784555/index.html"
"url": "https://jvn.jp/en/jp/JVN38784555/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN38784555/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20616",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.skyseaclientview.net/news/210112_01/"
"url": "https://www.skyseaclientview.net/news/210112_01/",
"refsource": "MISC",
"name": "https://www.skyseaclientview.net/news/210112_01/"
},
{
"url": "https://jvn.jp/en/jp/JVN69635538/index.html"
"url": "https://jvn.jp/en/jp/JVN69635538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN69635538/index.html"
}
]
},