From a30a230683d8f5021602182648bc32b164890410 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 1 Mar 2020 18:01:09 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/10xxx/CVE-2016-10743.json | 5 +++++ 2019/10xxx/CVE-2019-10064.json | 5 +++++ 2020/0xxx/CVE-2020-0668.json | 5 +++++ 2020/5xxx/CVE-2020-5497.json | 5 +++++ 2020/7xxx/CVE-2020-7246.json | 5 +++++ 2020/8xxx/CVE-2020-8012.json | 5 +++++ 6 files changed, 30 insertions(+) diff --git a/2016/10xxx/CVE-2016-10743.json b/2016/10xxx/CVE-2016-10743.json index e8b6e798b25..c61c7a5efb7 100644 --- a/2016/10xxx/CVE-2016-10743.json +++ b/2016/10xxx/CVE-2016-10743.json @@ -81,6 +81,11 @@ "refsource": "FULLDISC", "name": "20200227 Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064)", "url": "http://seclists.org/fulldisclosure/2020/Feb/26" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html", + "url": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html" } ] } diff --git a/2019/10xxx/CVE-2019-10064.json b/2019/10xxx/CVE-2019-10064.json index 7b5897fa35e..4ea31f79f90 100644 --- a/2019/10xxx/CVE-2019-10064.json +++ b/2019/10xxx/CVE-2019-10064.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2020/02/27/1", "url": "http://www.openwall.com/lists/oss-security/2020/02/27/1" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html", + "url": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html" } ] } diff --git a/2020/0xxx/CVE-2020-0668.json b/2020/0xxx/CVE-2020-0668.json index b0d63abc655..f63b3763c1f 100644 --- a/2020/0xxx/CVE-2020-0668.json +++ b/2020/0xxx/CVE-2020-0668.json @@ -250,6 +250,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-257/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-257/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html" } ] } diff --git a/2020/5xxx/CVE-2020-5497.json b/2020/5xxx/CVE-2020-5497.json index c84ef0856b1..441fd2c2039 100644 --- a/2020/5xxx/CVE-2020-5497.json +++ b/2020/5xxx/CVE-2020-5497.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20200227 CVE-2020-5497 - MITREid Connect XSS", "url": "http://seclists.org/fulldisclosure/2020/Feb/25" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html" } ] } diff --git a/2020/7xxx/CVE-2020-7246.json b/2020/7xxx/CVE-2020-7246.json index c8377064df7..998b7ce3d45 100644 --- a/2020/7xxx/CVE-2020-7246.json +++ b/2020/7xxx/CVE-2020-7246.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html" } ] } diff --git a/2020/8xxx/CVE-2020-8012.json b/2020/8xxx/CVE-2020-8012.json index 329eb7ae3ce..7b33a5db015 100644 --- a/2020/8xxx/CVE-2020-8012.json +++ b/2020/8xxx/CVE-2020-8012.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://techdocs.broadcom.com/us/product-content/status/announcement-documents/2019/ca20200205-01-security-notice-for-ca-unified-infrastructure-management.html", "url": "https://techdocs.broadcom.com/us/product-content/status/announcement-documents/2019/ca20200205-01-security-notice-for-ca-unified-infrastructure-management.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html" } ] },