diff --git a/2005/1xxx/CVE-2005-1513.json b/2005/1xxx/CVE-2005-1513.json index cd269811cc4..b7d648a8604 100644 --- a/2005/1xxx/CVE-2005-1513.json +++ b/2005/1xxx/CVE-2005-1513.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[oss-security] 20200520 Re: Remote Code Execution in qmail (CVE-2005-1513)", "url": "http://www.openwall.com/lists/oss-security/2020/05/20/2" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20200520 Re: Remote Code Execution in qmail (CVE-2005-1513)", + "url": "http://www.openwall.com/lists/oss-security/2020/05/20/5" } ] } diff --git a/2020/5xxx/CVE-2020-5364.json b/2020/5xxx/CVE-2020-5364.json index 3d51ac560f8..ba52224da38 100644 --- a/2020/5xxx/CVE-2020-5364.json +++ b/2020/5xxx/CVE-2020-5364.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2020-05-15", - "ID": "CVE-2020-5364", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2020-05-15", + "ID": "CVE-2020-5364", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Isilon OneFS", + "product_name": "Isilon OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.2.2" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell EMC Isilon OneFS versions 8.2.2 and earlier contain an SNMPv2 vulnerability. The SNMPv2 services is enabled, by default, with a pre-configured community string. This community string allows read-only access to many aspects of the Isilon cluster, some of which are considered sensitive and can foster additional access." } ] - }, + }, "impact": { "cvss": { - "baseScore": 5.3, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-201: Exposure of Sensitive Information Through Sent Data" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/security/en-us/details/543775/DSA-2020-124-Dell-EMC-Isilon-OneFS-Security-Update-for-Multiple-Vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/security/en-us/details/543775/DSA-2020-124-Dell-EMC-Isilon-OneFS-Security-Update-for-Multiple-Vulnerabilities", + "name": "https://www.dell.com/support/security/en-us/details/543775/DSA-2020-124-Dell-EMC-Isilon-OneFS-Security-Update-for-Multiple-Vulnerabilities" } ] } diff --git a/2020/5xxx/CVE-2020-5365.json b/2020/5xxx/CVE-2020-5365.json index fa2623e2f56..7e26a3c33bf 100644 --- a/2020/5xxx/CVE-2020-5365.json +++ b/2020/5xxx/CVE-2020-5365.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2020-05-15", - "ID": "CVE-2020-5365", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2020-05-15", + "ID": "CVE-2020-5365", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Isilon OneFS", + "product_name": "Isilon OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.2.2" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell EMC Isilon versions 8.2.2 and earlier contain a remotesupport vulnerability. The pre-configured support account, remotesupport, is bundled in the Dell EMC Isilon OneFS installation. This account is used for diagnostics and other support functions. Although the default password is different for every cluster, it is predictable." } ] - }, + }, "impact": { "cvss": { - "baseScore": 5.3, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-341: Predictable from Observable State" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/security/en-us/details/543775/DSA-2020-124-Dell-EMC-Isilon-OneFS-Security-Update-for-Multiple-Vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/security/en-us/details/543775/DSA-2020-124-Dell-EMC-Isilon-OneFS-Security-Update-for-Multiple-Vulnerabilities", + "name": "https://www.dell.com/support/security/en-us/details/543775/DSA-2020-124-Dell-EMC-Isilon-OneFS-Security-Update-for-Multiple-Vulnerabilities" } ] }