"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-01-30 00:01:09 +00:00
parent cdecacedb7
commit bcc948779b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
13 changed files with 78 additions and 0 deletions

View File

@ -86,6 +86,11 @@
"name": "[bug-wget] 20160824 Re: Wget - acess list bypass / race condition PoC",
"refsource": "MLIST",
"url": "http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2086-1] wget security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00031.html"
}
]
}

View File

@ -181,6 +181,11 @@
"refsource": "UBUNTU",
"name": "USN-4246-1",
"url": "https://usn.ubuntu.com/4246-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html"
}
]
}

View File

@ -196,6 +196,11 @@
"refsource": "UBUNTU",
"name": "USN-4246-1",
"url": "https://usn.ubuntu.com/4246-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html"
}
]
}

View File

@ -181,6 +181,11 @@
"refsource": "UBUNTU",
"name": "USN-4246-1",
"url": "https://usn.ubuntu.com/4246-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html"
}
]
}

View File

@ -196,6 +196,11 @@
"refsource": "UBUNTU",
"name": "USN-4246-1",
"url": "https://usn.ubuntu.com/4246-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html"
}
]
}

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://hackpuntes.com/cve-2019-19032-xmlblueprint-16-191112-inyeccion-xml/",
"url": "https://hackpuntes.com/cve-2019-19032-xmlblueprint-16-191112-inyeccion-xml/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156139/XMLBlueprint-16.191112-XML-Injection.html",
"url": "http://packetstormsecurity.com/files/156139/XMLBlueprint-16.191112-XML-Injection.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0145",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2084-1] graphicsmagick security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0145",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2084-1] graphicsmagick security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0145",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2084-1] graphicsmagick security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00029.html"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://github.com/Xh4H/Satellian-CVE-2020-7980",
"url": "https://github.com/Xh4H/Satellian-CVE-2020-7980"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/J3rryBl4nks/CUPSEasyExploits",
"refsource": "MISC",
"name": "https://github.com/J3rryBl4nks/CUPSEasyExploits"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html",
"url": "http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/J3rryBl4nks/CUPSEasyExploits",
"refsource": "MISC",
"name": "https://github.com/J3rryBl4nks/CUPSEasyExploits"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html",
"url": "http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-8441",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}