From 0a9ba784529af85bcc10ea7037375f1f57b1285d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 27 Oct 2020 18:01:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/26xxx/CVE-2020-26156.json | 4 +-- 2020/27xxx/CVE-2020-27848.json | 18 ++++++++++ 2020/27xxx/CVE-2020-27849.json | 18 ++++++++++ 2020/27xxx/CVE-2020-27850.json | 18 ++++++++++ 2020/27xxx/CVE-2020-27851.json | 18 ++++++++++ 2020/27xxx/CVE-2020-27852.json | 18 ++++++++++ 2020/27xxx/CVE-2020-27853.json | 62 ++++++++++++++++++++++++++++++++++ 2020/7xxx/CVE-2020-7755.json | 12 ++++--- 8 files changed, 161 insertions(+), 7 deletions(-) create mode 100644 2020/27xxx/CVE-2020-27848.json create mode 100644 2020/27xxx/CVE-2020-27849.json create mode 100644 2020/27xxx/CVE-2020-27850.json create mode 100644 2020/27xxx/CVE-2020-27851.json create mode 100644 2020/27xxx/CVE-2020-27852.json create mode 100644 2020/27xxx/CVE-2020-27853.json diff --git a/2020/26xxx/CVE-2020-26156.json b/2020/26xxx/CVE-2020-26156.json index 5a02ad32ee4..833936f7c0e 100644 --- a/2020/26xxx/CVE-2020-26156.json +++ b/2020/26xxx/CVE-2020-26156.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2020-26156", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2020/27xxx/CVE-2020-27848.json b/2020/27xxx/CVE-2020-27848.json new file mode 100644 index 00000000000..a35b792da3d --- /dev/null +++ b/2020/27xxx/CVE-2020-27848.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27848", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27849.json b/2020/27xxx/CVE-2020-27849.json new file mode 100644 index 00000000000..63945c88c7d --- /dev/null +++ b/2020/27xxx/CVE-2020-27849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27850.json b/2020/27xxx/CVE-2020-27850.json new file mode 100644 index 00000000000..7e1f48f6525 --- /dev/null +++ b/2020/27xxx/CVE-2020-27850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27851.json b/2020/27xxx/CVE-2020-27851.json new file mode 100644 index 00000000000..e17729d068e --- /dev/null +++ b/2020/27xxx/CVE-2020-27851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27852.json b/2020/27xxx/CVE-2020-27852.json new file mode 100644 index 00000000000..4ae6aea2ee6 --- /dev/null +++ b/2020/27xxx/CVE-2020-27852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27853.json b/2020/27xxx/CVE-2020-27853.json new file mode 100644 index 00000000000..e2f4acf770a --- /dev/null +++ b/2020/27xxx/CVE-2020-27853.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-27853", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Wire before 2020-10-16 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a format string. This affects Wire AVS (Audio, Video, and Signaling) 5.3 through 6.x before 6.4, the Wire Secure Messenger application before 3.49.918 for Android, and the Wire Secure Messenger application before 3.61 for iOS. This occurs via the value parameter to sdp_media_set_lattr in peerflow/sdp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wireapp/wire-audio-video-signaling/issues/23#issuecomment-710075689", + "refsource": "MISC", + "name": "https://github.com/wireapp/wire-audio-video-signaling/issues/23#issuecomment-710075689" + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7755.json b/2020/7xxx/CVE-2020-7755.json index 35a02df77f1..b01694d3a19 100644 --- a/2020/7xxx/CVE-2020-7755.json +++ b/2020/7xxx/CVE-2020-7755.json @@ -48,12 +48,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-DATGUI-1016275" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-DATGUI-1016275", + "name": "https://snyk.io/vuln/SNYK-JS-DATGUI-1016275" }, { - "refsource": "CONFIRM", - "url": "https://github.com/dataarts/dat.gui/issues/278" + "refsource": "MISC", + "url": "https://github.com/dataarts/dat.gui/issues/278", + "name": "https://github.com/dataarts/dat.gui/issues/278" } ] }, @@ -61,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.\r\n\r\n" + "value": "All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values." } ] },