"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-06-17 18:01:36 +00:00
parent fd7bdb3ebe
commit 16613dd311
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
8 changed files with 202 additions and 138 deletions

View File

@ -63,6 +63,11 @@
"refsource": "UBUNTU",
"name": "USN-4389-1",
"url": "https://usn.ubuntu.com/4389-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4387-1",
"url": "https://usn.ubuntu.com/4387-1/"
}
]
},

View File

@ -78,6 +78,11 @@
"refsource": "UBUNTU",
"name": "USN-4389-1",
"url": "https://usn.ubuntu.com/4389-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4387-1",
"url": "https://usn.ubuntu.com/4387-1/"
}
]
},

View File

@ -106,6 +106,11 @@
"refsource": "UBUNTU",
"name": "USN-4389-1",
"url": "https://usn.ubuntu.com/4389-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4387-1",
"url": "https://usn.ubuntu.com/4387-1/"
}
]
}

View File

@ -121,6 +121,11 @@
"refsource": "UBUNTU",
"name": "USN-4389-1",
"url": "https://usn.ubuntu.com/4389-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4387-1",
"url": "https://usn.ubuntu.com/4387-1/"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "UBUNTU",
"name": "USN-4389-1",
"url": "https://usn.ubuntu.com/4389-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4387-1",
"url": "https://usn.ubuntu.com/4387-1/"
}
]
}

View File

@ -63,24 +63,9 @@
"name": "https://twitter.com/sepcali/status/1262551597990711296"
},
{
"url": "https://twitter.com/sepcali/status/1262551336152948738",
"refsource": "MISC",
"name": "https://twitter.com/sepcali/status/1262551336152948738"
},
{
"url": "https://twitter.com/sepcali/status/1262551277940211712",
"refsource": "MISC",
"name": "https://twitter.com/sepcali/status/1262551277940211712"
},
{
"url": "https://twitter.com/sepcali",
"refsource": "MISC",
"name": "https://twitter.com/sepcali"
},
{
"url": "https://github.com/sepcali",
"refsource": "MISC",
"name": "https://github.com/sepcali"
"refsource": "FULLDISC",
"name": "20200616 Pulse Secure Client < 9.1R6 TOCTOU Privilege Escalation (CVE-2020-13162)",
"url": "http://seclists.org/fulldisclosure/2020/Jun/25"
},
{
"refsource": "MISC",
@ -96,6 +81,16 @@
"refsource": "CONFIRM",
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44503",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44503"
},
{
"refsource": "MISC",
"name": "https://twitter.com/gsepcali/status/1262551597990711296",
"url": "https://twitter.com/gsepcali/status/1262551597990711296"
},
{
"refsource": "MISC",
"name": "https://twitter.com/gsepcali/status/1272927080909623297",
"url": "https://twitter.com/gsepcali/status/1272927080909623297"
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-6869",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@zte.com.cn",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "<ZTEMarket APK>",
"version": {
"version_data": [
{
"version_value": "<All versions up to 10.06>"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information leak"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1013022",
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1013022"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "All versions up to 10.06 of ZTEMarket APK are impacted by an information leak vulnerability. Due to Activity Component exposure users can exploit this vulnerability to get the private cookie and execute silent installation."
}
]
}