"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-04-15 13:01:24 +00:00
parent e1c93dcc51
commit cd4b4aa3b7
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 22 additions and 12 deletions

View File

@ -161,6 +161,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[zookeeper-commits] 20200415 [zookeeper] branch master updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612", "name": "[zookeeper-commits] 20200415 [zookeeper] branch master updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612",
"url": "https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E" "url": "https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-master-maven-jdk12 #465",
"url": "https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-branch36-java8 #137",
"url": "https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E"
} }
] ]
} }

View File

@ -4,7 +4,7 @@
"DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "DATE_PUBLIC": "2020-04-14T00:00:00.000Z",
"ID": "CVE-2020-7250", "ID": "CVE-2020-7250",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "ENS symbolic link log file manipulation vulnerability" "TITLE": "ENS symbolic link log file manipulation vulnerability\u202f"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -34,7 +34,7 @@
"credit": [ "credit": [
{ {
"lang": "eng", "lang": "eng",
"value": "McAfee credits Jakub Palaczynski (ING Tech Poland)and Eran Shimony (CyberArk) for independently reporting this flaw" "value": "McAfee credits Jakub Palaczynski \u202f(ING Tech Poland)\u202fand Eran Shimony (CyberArk) for independently reporting this flaw"
} }
], ],
"data_format": "MITRE", "data_format": "MITRE",
@ -44,7 +44,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory. " "value": "Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory."
} }
] ]
}, },
@ -91,4 +91,4 @@
"source": { "source": {
"discovery": "EXTERNAL" "discovery": "EXTERNAL"
} }
} }

View File

@ -4,7 +4,7 @@
"DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "DATE_PUBLIC": "2020-04-14T00:00:00.000Z",
"ID": "CVE-2020-7255", "ID": "CVE-2020-7255",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Privilege Escalation vulnerability in ENS" "TITLE": "Privilege Escalation vulnerability \u202fin ENS\u202f"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -34,7 +34,7 @@
"credit": [ "credit": [
{ {
"lang": "eng", "lang": "eng",
"value": "McAfee credits Lockheed Martin Red Team for reporting this flaw" "value": "McAfee \u202fcredits\u202f Lockheed Martin Red Team for \u202f\u202freporting this flaw"
} }
], ],
"data_format": "MITRE", "data_format": "MITRE",
@ -44,7 +44,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration. " "value": "Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration."
} }
] ]
}, },
@ -91,4 +91,4 @@
"source": { "source": {
"discovery": "EXTERNAL" "discovery": "EXTERNAL"
} }
} }

View File

@ -4,7 +4,7 @@
"DATE_PUBLIC": "2020-04-14T00:00:00.000Z", "DATE_PUBLIC": "2020-04-14T00:00:00.000Z",
"ID": "CVE-2020-7257", "ID": "CVE-2020-7257",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Privilege Escalation vulnerability through Symbolic links in ENS" "TITLE": "\u202fPrivilege Escalation vulnerability through Symbolic links in ENS"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -34,7 +34,7 @@
"credit": [ "credit": [
{ {
"lang": "eng", "lang": "eng",
"value": "McAfee credits Jakub Palaczynski (ING Tech Poland) for reporting this flaw" "value": "McAfee \u202fcredits \u202fJakub \u202fPalaczynski \u202f(ING Tech Poland) for reporting this flaw"
} }
], ],
"data_format": "MITRE", "data_format": "MITRE",
@ -44,7 +44,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Privilege escalation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links whilst an anti-virus scan was in progress. This is timing dependent. " "value": "Privilege escalation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links whilst an anti-virus scan was in progress. This is timing dependent."
} }
] ]
}, },
@ -91,4 +91,4 @@
"source": { "source": {
"discovery": "EXTERNAL" "discovery": "EXTERNAL"
} }
} }