"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-04-15 13:01:24 +00:00
parent e1c93dcc51
commit cd4b4aa3b7
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 22 additions and 12 deletions

View File

@ -161,6 +161,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[zookeeper-commits] 20200415 [zookeeper] branch master updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612", "name": "[zookeeper-commits] 20200415 [zookeeper] branch master updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612",
"url": "https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E" "url": "https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-master-maven-jdk12 #465",
"url": "https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-branch36-java8 #137",
"url": "https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E"
} }
] ]
} }

View File

@ -4,7 +4,7 @@
"DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "DATE_PUBLIC": "2020-04-14T00:00:00.000Z",
"ID": "CVE-2020-7250", "ID": "CVE-2020-7250",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "ENS symbolic link log file manipulation vulnerability" "TITLE": "ENS symbolic link log file manipulation vulnerability\u202f"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -34,7 +34,7 @@
"credit": [ "credit": [
{ {
"lang": "eng", "lang": "eng",
"value": "McAfee credits Jakub Palaczynski (ING Tech Poland)and Eran Shimony (CyberArk) for independently reporting this flaw" "value": "McAfee credits Jakub Palaczynski \u202f(ING Tech Poland)\u202fand Eran Shimony (CyberArk) for independently reporting this flaw"
} }
], ],
"data_format": "MITRE", "data_format": "MITRE",
@ -44,7 +44,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory. " "value": "Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory."
} }
] ]
}, },

View File

@ -4,7 +4,7 @@
"DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "DATE_PUBLIC": "2020-04-14T00:00:00.000Z",
"ID": "CVE-2020-7255", "ID": "CVE-2020-7255",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Privilege Escalation vulnerability in ENS" "TITLE": "Privilege Escalation vulnerability \u202fin ENS\u202f"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -34,7 +34,7 @@
"credit": [ "credit": [
{ {
"lang": "eng", "lang": "eng",
"value": "McAfee credits Lockheed Martin Red Team for reporting this flaw" "value": "McAfee \u202fcredits\u202f Lockheed Martin Red Team for \u202f\u202freporting this flaw"
} }
], ],
"data_format": "MITRE", "data_format": "MITRE",

View File

@ -4,7 +4,7 @@
"DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "DATE_PUBLIC": "2020-04-14T00:00:00.000Z",
"ID": "CVE-2020-7257", "ID": "CVE-2020-7257",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Privilege Escalation vulnerability through Symbolic links in ENS" "TITLE": "\u202fPrivilege Escalation vulnerability through Symbolic links in ENS"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -34,7 +34,7 @@
"credit": [ "credit": [
{ {
"lang": "eng", "lang": "eng",
"value": "McAfee credits Jakub Palaczynski (ING Tech Poland) for reporting this flaw" "value": "McAfee \u202fcredits \u202fJakub \u202fPalaczynski \u202f(ING Tech Poland) for reporting this flaw"
} }
], ],
"data_format": "MITRE", "data_format": "MITRE",