"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-11-02 21:03:06 +00:00
parent 6ab8be6d35
commit ecab4e8aac
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
63 changed files with 940 additions and 25 deletions

View File

@ -101,6 +101,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2377-1] qt4-x11 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2422-1] qtsvg-opensource-src security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00035.html"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-e465ec0651",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKMQLYAHCDIE5TBXWDNBG7554KWI5QT3/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1787",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00080.html"
}
]
}

View File

@ -101,6 +101,16 @@
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "GENTOO",
"name": "GLSA-202007-39",
"url": "https://security.gentoo.org/glsa/202007-39"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -66,6 +66,21 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1771",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-88fb82d1cd",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-869cd99560",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-81c80ff1ed",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/"
}
]
}

View File

@ -66,6 +66,21 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1771",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-88fb82d1cd",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5OXECUBSXEO7S3TCLSBCITLQIMOCL6MV/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-869cd99560",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEJVEIQMRXJ26ZT6657W5RYH7YECVGNB/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-81c80ff1ed",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "UBUNTU",
"name": "USN-4336-1",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "UBUNTU",
"name": "USN-4336-1",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "UBUNTU",
"name": "USN-4336-1",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1790",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1804",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
}
]
}

View File

@ -63,6 +63,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -66,6 +66,16 @@
"refsource": "UBUNTU",
"name": "USN-4470-1",
"url": "https://usn.ubuntu.com/4470-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1791",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1798",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1791",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1798",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1791",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1798",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
}
]
}

View File

@ -66,6 +66,16 @@
"refsource": "UBUNTU",
"name": "USN-4470-1",
"url": "https://usn.ubuntu.com/4470-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1791",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1798",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1791",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1798",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
}
]
}

View File

@ -66,6 +66,16 @@
"refsource": "UBUNTU",
"name": "USN-4470-1",
"url": "https://usn.ubuntu.com/4470-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1791",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1798",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
}
]
}

View File

@ -86,6 +86,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2332-2] sane-backends regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1791",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1798",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html"
}
]
}

View File

@ -111,6 +111,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201016-0007/",
"url": "https://security.netapp.com/advisory/ntap-20201016-0007/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1799",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html"
}
]
},

View File

@ -83,6 +83,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -68,6 +68,26 @@
"refsource": "UBUNTU",
"name": "USN-4572-2",
"url": "https://usn.ubuntu.com/4572-2/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1802",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1803",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201101 [SECURITY] [DLA 2428-1] spice-gtk security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00002.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201101 [SECURITY] [DLA 2427-1] spice security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00001.html"
}
]
},

View File

@ -98,6 +98,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -91,6 +91,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -63,6 +63,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -101,6 +101,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1780",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1785",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
}
]
},

View File

@ -106,6 +106,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1780",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1785",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
}
]
},

View File

@ -106,6 +106,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1780",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1785",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
}
]
},

View File

@ -106,6 +106,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1780",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1785",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1780",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1785",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html"
}
]
},

View File

@ -89,12 +89,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://ubuntu.com/security/notices/USN-4537-1"
"refsource": "MISC",
"url": "https://www.eyecontrol.nl/blog/the-story-of-3-cves-in-ubuntu-desktop.html",
"name": "https://www.eyecontrol.nl/blog/the-story-of-3-cves-in-ubuntu-desktop.html"
},
{
"refsource": "MISC",
"url": "https://www.eyecontrol.nl/blog/the-story-of-3-cves-in-ubuntu-desktop.html"
"url": "https://ubuntu.com/security/notices/USN-4537-1",
"name": "https://ubuntu.com/security/notices/USN-4537-1"
}
]
},
@ -105,4 +107,4 @@
],
"discovery": "EXTERNAL"
}
}
}

View File

@ -106,6 +106,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -106,6 +106,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -78,6 +78,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
},

View File

@ -58,7 +58,7 @@
"description_data": [
{
"lang": "eng",
"value": "MailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the users access token."
"value": "MailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the user\u2019s access token."
}
]
},
@ -96,8 +96,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4118-6292c-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4118-6292c-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4118-6292c-1.html"
}
]
},

View File

@ -86,6 +86,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-27358",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-27358",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another's conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
"refsource": "MISC",
"name": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/"
},
{
"refsource": "MISC",
"name": "https://www.ruse.tech/blog/38",
"url": "https://www.ruse.tech/blog/38"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-27359",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-27359",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A cross-site scripting (XSS) issue in REDCap 8.11.6 through 9.x before 10 allows attackers to inject arbitrary JavaScript or HTML in the Messenger feature. It was found that the filename of the image or file attached in a message could be used to perform this XSS attack. A user could craft a message and send it to anyone on the platform including admins. The XSS payload would execute on the other account without interaction from the user on several pages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
"refsource": "MISC",
"name": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/"
},
{
"refsource": "MISC",
"name": "https://www.ruse.tech/blog/38",
"url": "https://www.ruse.tech/blog/38"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://xenbits.xen.org/xsa/advisory-347.html",
"refsource": "MISC",
"name": "https://xenbits.xen.org/xsa/advisory-347.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1783",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://xenbits.xen.org/xsa/advisory-346.html",
"refsource": "MISC",
"name": "https://xenbits.xen.org/xsa/advisory-346.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1783",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://xenbits.xen.org/xsa/advisory-345.html",
"refsource": "MISC",
"name": "https://xenbits.xen.org/xsa/advisory-345.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1783",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
}
]
}

View File

@ -66,6 +66,11 @@
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070",
"refsource": "MISC",
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1783",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-27992",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-27992",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Dr.Fone 3.0.0 allows local users to gain privileges via a Trojan horse DriverInstall.exe because %PROGRAMFILES(X86)%\\Wondershare\\dr.fone\\Library\\DriverInstaller has Full Control for BUILTIN\\Users."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://drfone.wondershare.com",
"refsource": "MISC",
"name": "https://drfone.wondershare.com"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html",
"url": "https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html"
}
]
}

View File

@ -0,0 +1,77 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-28041",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP ALG implementation on NETGEAR Nighthawk R7000 1.0.9.64_10.2.64 devices allows remote attackers to communicate with arbitrary TCP and UDP services on a victim's intranet machine, if the victim visits an attacker-controlled web site with a modern browser, aka NAT Slipstreaming. This occurs because the ALG takes action based on an IP packet with an initial REGISTER substring in the TCP data, and the correct intranet IP address in the subsequent Via header, without properly considering that connection progress and fragmentation affect the meaning of the packet data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://news.ycombinator.com/item?id=24956616",
"refsource": "MISC",
"name": "https://news.ycombinator.com/item?id=24956616"
},
{
"url": "https://samy.pl/slipstream/",
"refsource": "MISC",
"name": "https://samy.pl/slipstream/"
},
{
"url": "https://github.com/samyk/slipstream",
"refsource": "MISC",
"name": "https://github.com/samyk/slipstream"
},
{
"refsource": "MISC",
"name": "https://news.ycombinator.com/item?id=24958281",
"url": "https://news.ycombinator.com/item?id=24958281"
}
]
}
}

View File

@ -0,0 +1,70 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-28042",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850",
"refsource": "MISC",
"name": "https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850"
},
{
"url": "https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee",
"refsource": "MISC",
"name": "https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-28043",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MISP through 2.4.133 allows SSRF in the REST client via the use_full_path parameter with an arbitrary URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/MISP/MISP/commit/6e81c8ee8ad19576c055b5c4773f914b918f32be",
"refsource": "MISC",
"name": "https://github.com/MISP/MISP/commit/6e81c8ee8ad19576c055b5c4773f914b918f32be"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-28044",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An attacker with physical access to a PAX Point Of Sale device with ProlinOS through 2.4.161.8859R can boot it in management mode, enable the XCB service, and then list, read, create, and overwrite files with MAINAPP permissions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://git.lsd.cat/g/pax-pwn",
"refsource": "MISC",
"name": "https://git.lsd.cat/g/pax-pwn"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-28045",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An unsigned-library issue was discovered in ProlinOS through 2.4.161.8859R. This OS requires installed applications and all system binaries to be signed either by the manufacturer or by the Point Of Sale application developer and distributor. The signature is a 2048-byte RSA signature verified in the kernel prior to ELF execution. Shared libraries, however, do not need to be signed, and they are not verified. An attacker may execute a custom binary by compiling it as a shared object and loading it via LD_PRELOAD."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://git.lsd.cat/g/pax-pwn",
"refsource": "MISC",
"name": "https://git.lsd.cat/g/pax-pwn"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-28046",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch, a related issue to CVE-2019-11360."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://git.lsd.cat/g/pax-pwn",
"refsource": "MISC",
"name": "https://git.lsd.cat/g/pax-pwn"
}
]
}
}