mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 18:28:42 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
6ab8be6d35
commit
ecab4e8aac
@ -101,6 +101,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2377-1] qt4-x11 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2422-1] qtsvg-opensource-src security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00035.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,16 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-39",
|
||||
"url": "https://security.gentoo.org/glsa/202007-39"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2019-e465ec0651",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKMQLYAHCDIE5TBXWDNBG7554KWI5QT3/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1787",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00080.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,16 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-39",
|
||||
"url": "https://security.gentoo.org/glsa/202007-39"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,16 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-39",
|
||||
"url": "https://security.gentoo.org/glsa/202007-39"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,16 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-39",
|
||||
"url": "https://security.gentoo.org/glsa/202007-39"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,16 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-39",
|
||||
"url": "https://security.gentoo.org/glsa/202007-39"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,21 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1771",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-88fb82d1cd",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-869cd99560",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-81c80ff1ed",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,21 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1771",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-88fb82d1cd",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-869cd99560",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-81c80ff1ed",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,16 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4336-1",
|
||||
"url": "https://usn.ubuntu.com/4336-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,16 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4336-1",
|
||||
"url": "https://usn.ubuntu.com/4336-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,16 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4336-1",
|
||||
"url": "https://usn.ubuntu.com/4336-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1790",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1804",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,6 +63,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -116,6 +116,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,16 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4470-1",
|
||||
"url": "https://usn.ubuntu.com/4470-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1791",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1798",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1791",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1798",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1791",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1798",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,16 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4470-1",
|
||||
"url": "https://usn.ubuntu.com/4470-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1791",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1798",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1791",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1798",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,16 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4470-1",
|
||||
"url": "https://usn.ubuntu.com/4470-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1791",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1798",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1791",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1798",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20201016-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20201016-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1799",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,6 +83,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,26 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4572-2",
|
||||
"url": "https://usn.ubuntu.com/4572-2/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1802",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1803",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201101 [SECURITY] [DLA 2428-1] spice-gtk security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00002.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201101 [SECURITY] [DLA 2427-1] spice security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00001.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -98,6 +98,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -63,6 +63,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -101,6 +101,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1780",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1785",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -106,6 +106,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1780",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1785",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -106,6 +106,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1780",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1785",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -106,6 +106,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1780",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1785",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -116,6 +116,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1780",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1785",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -89,12 +89,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://ubuntu.com/security/notices/USN-4537-1"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.eyecontrol.nl/blog/the-story-of-3-cves-in-ubuntu-desktop.html",
|
||||
"name": "https://www.eyecontrol.nl/blog/the-story-of-3-cves-in-ubuntu-desktop.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.eyecontrol.nl/blog/the-story-of-3-cves-in-ubuntu-desktop.html"
|
||||
"url": "https://ubuntu.com/security/notices/USN-4537-1",
|
||||
"name": "https://ubuntu.com/security/notices/USN-4537-1"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -105,4 +107,4 @@
|
||||
],
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
}
|
@ -106,6 +106,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -83,6 +83,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,7 +58,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "MailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the user’s access token."
|
||||
"value": "MailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the user\u2019s access token."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -96,8 +96,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-4118-6292c-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-4118-6292c-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-4118-6292c-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-27358",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-27358",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another's conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ruse.tech/blog/38",
|
||||
"url": "https://www.ruse.tech/blog/38"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-27359",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-27359",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A cross-site scripting (XSS) issue in REDCap 8.11.6 through 9.x before 10 allows attackers to inject arbitrary JavaScript or HTML in the Messenger feature. It was found that the filename of the image or file attached in a message could be used to perform this XSS attack. A user could craft a message and send it to anyone on the platform including admins. The XSS payload would execute on the other account without interaction from the user on several pages."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ruse.tech/blog/38",
|
||||
"url": "https://www.ruse.tech/blog/38"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://xenbits.xen.org/xsa/advisory-347.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xen.org/xsa/advisory-347.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1783",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://xenbits.xen.org/xsa/advisory-346.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xen.org/xsa/advisory-346.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1783",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://xenbits.xen.org/xsa/advisory-345.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xen.org/xsa/advisory-345.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1783",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1783",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-27992",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-27992",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Dr.Fone 3.0.0 allows local users to gain privileges via a Trojan horse DriverInstall.exe because %PROGRAMFILES(X86)%\\Wondershare\\dr.fone\\Library\\DriverInstaller has Full Control for BUILTIN\\Users."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://drfone.wondershare.com",
|
||||
"refsource": "MISC",
|
||||
"name": "https://drfone.wondershare.com"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html",
|
||||
"url": "https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
77
2020/28xxx/CVE-2020-28041.json
Normal file
77
2020/28xxx/CVE-2020-28041.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-28041",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The SIP ALG implementation on NETGEAR Nighthawk R7000 1.0.9.64_10.2.64 devices allows remote attackers to communicate with arbitrary TCP and UDP services on a victim's intranet machine, if the victim visits an attacker-controlled web site with a modern browser, aka NAT Slipstreaming. This occurs because the ALG takes action based on an IP packet with an initial REGISTER substring in the TCP data, and the correct intranet IP address in the subsequent Via header, without properly considering that connection progress and fragmentation affect the meaning of the packet data."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=24956616",
|
||||
"refsource": "MISC",
|
||||
"name": "https://news.ycombinator.com/item?id=24956616"
|
||||
},
|
||||
{
|
||||
"url": "https://samy.pl/slipstream/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://samy.pl/slipstream/"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/samyk/slipstream",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/samyk/slipstream"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://news.ycombinator.com/item?id=24958281",
|
||||
"url": "https://news.ycombinator.com/item?id=24958281"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
70
2020/28xxx/CVE-2020-28042.json
Normal file
70
2020/28xxx/CVE-2020-28042.json
Normal file
@ -0,0 +1,70 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-28042",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850",
|
||||
"refsource": "MISC",
|
||||
"name": "https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "INTERNAL"
|
||||
}
|
||||
}
|
62
2020/28xxx/CVE-2020-28043.json
Normal file
62
2020/28xxx/CVE-2020-28043.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-28043",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "MISP through 2.4.133 allows SSRF in the REST client via the use_full_path parameter with an arbitrary URL."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/MISP/MISP/commit/6e81c8ee8ad19576c055b5c4773f914b918f32be",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/MISP/MISP/commit/6e81c8ee8ad19576c055b5c4773f914b918f32be"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2020/28xxx/CVE-2020-28044.json
Normal file
62
2020/28xxx/CVE-2020-28044.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-28044",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An attacker with physical access to a PAX Point Of Sale device with ProlinOS through 2.4.161.8859R can boot it in management mode, enable the XCB service, and then list, read, create, and overwrite files with MAINAPP permissions."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://git.lsd.cat/g/pax-pwn",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.lsd.cat/g/pax-pwn"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2020/28xxx/CVE-2020-28045.json
Normal file
62
2020/28xxx/CVE-2020-28045.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-28045",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An unsigned-library issue was discovered in ProlinOS through 2.4.161.8859R. This OS requires installed applications and all system binaries to be signed either by the manufacturer or by the Point Of Sale application developer and distributor. The signature is a 2048-byte RSA signature verified in the kernel prior to ELF execution. Shared libraries, however, do not need to be signed, and they are not verified. An attacker may execute a custom binary by compiling it as a shared object and loading it via LD_PRELOAD."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://git.lsd.cat/g/pax-pwn",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.lsd.cat/g/pax-pwn"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2020/28xxx/CVE-2020-28046.json
Normal file
62
2020/28xxx/CVE-2020-28046.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-28046",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch, a related issue to CVE-2019-11360."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://git.lsd.cat/g/pax-pwn",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.lsd.cat/g/pax-pwn"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user