From cd4b4aa3b70c35e1c1bc6e80997af9729d435bea Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 15 Apr 2020 13:01:24 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11612.json | 10 ++++++++++ 2020/7xxx/CVE-2020-7250.json | 8 ++++---- 2020/7xxx/CVE-2020-7255.json | 8 ++++---- 2020/7xxx/CVE-2020-7257.json | 8 ++++---- 4 files changed, 22 insertions(+), 12 deletions(-) diff --git a/2020/11xxx/CVE-2020-11612.json b/2020/11xxx/CVE-2020-11612.json index e776e2da4cb..2fbb0a9f476 100644 --- a/2020/11xxx/CVE-2020-11612.json +++ b/2020/11xxx/CVE-2020-11612.json @@ -161,6 +161,16 @@ "refsource": "MLIST", "name": "[zookeeper-commits] 20200415 [zookeeper] branch master updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612", "url": "https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-master-maven-jdk12 #465", + "url": "https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-branch36-java8 #137", + "url": "https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E" } ] } diff --git a/2020/7xxx/CVE-2020-7250.json b/2020/7xxx/CVE-2020-7250.json index 8a59f4d6a1c..2691e3ef0a2 100644 --- a/2020/7xxx/CVE-2020-7250.json +++ b/2020/7xxx/CVE-2020-7250.json @@ -4,7 +4,7 @@ "DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "ID": "CVE-2020-7250", "STATE": "PUBLIC", - "TITLE": "ENS symbolic link log file manipulation vulnerability " + "TITLE": "ENS symbolic link log file manipulation vulnerability\u202f" }, "affects": { "vendor": { @@ -34,7 +34,7 @@ "credit": [ { "lang": "eng", - "value": "McAfee credits Jakub Palaczynski  (ING Tech Poland) and Eran Shimony (CyberArk) for independently reporting this flaw" + "value": "McAfee credits Jakub Palaczynski \u202f(ING Tech Poland)\u202fand Eran Shimony (CyberArk) for independently reporting this flaw" } ], "data_format": "MITRE", @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.  " + "value": "Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory." } ] }, @@ -91,4 +91,4 @@ "source": { "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7255.json b/2020/7xxx/CVE-2020-7255.json index 3974f89477c..aaf5ee2521e 100644 --- a/2020/7xxx/CVE-2020-7255.json +++ b/2020/7xxx/CVE-2020-7255.json @@ -4,7 +4,7 @@ "DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "ID": "CVE-2020-7255", "STATE": "PUBLIC", - "TITLE": "Privilege Escalation vulnerability  in ENS " + "TITLE": "Privilege Escalation vulnerability \u202fin ENS\u202f" }, "affects": { "vendor": { @@ -34,7 +34,7 @@ "credit": [ { "lang": "eng", - "value": "McAfee  credits  Lockheed Martin Red Team for   reporting this flaw" + "value": "McAfee \u202fcredits\u202f Lockheed Martin Red Team for \u202f\u202freporting this flaw" } ], "data_format": "MITRE", @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration. " + "value": "Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration." } ] }, @@ -91,4 +91,4 @@ "source": { "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7257.json b/2020/7xxx/CVE-2020-7257.json index 5a416ebdd6b..33aad715a19 100644 --- a/2020/7xxx/CVE-2020-7257.json +++ b/2020/7xxx/CVE-2020-7257.json @@ -4,7 +4,7 @@ "DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "ID": "CVE-2020-7257", "STATE": "PUBLIC", - "TITLE": " Privilege Escalation vulnerability through Symbolic links in ENS" + "TITLE": "\u202fPrivilege Escalation vulnerability through Symbolic links in ENS" }, "affects": { "vendor": { @@ -34,7 +34,7 @@ "credit": [ { "lang": "eng", - "value": "McAfee  credits  Jakub  Palaczynski  (ING Tech Poland) for reporting this flaw" + "value": "McAfee \u202fcredits \u202fJakub \u202fPalaczynski \u202f(ING Tech Poland) for reporting this flaw" } ], "data_format": "MITRE", @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Privilege escalation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links whilst an anti-virus scan was in progress. This is timing dependent. " + "value": "Privilege escalation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links whilst an anti-virus scan was in progress. This is timing dependent." } ] }, @@ -91,4 +91,4 @@ "source": { "discovery": "EXTERNAL" } -} +} \ No newline at end of file