From 51dd6e514515d8f26cc7cd1958686263b6a93b81 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 13 Jan 2020 19:01:11 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2012/4xxx/CVE-2012-4767.json | 58 +++++++++++++++++++++++++- 2018/11xxx/CVE-2018-11805.json | 5 +++ 2019/10xxx/CVE-2019-10161.json | 5 +++ 2019/12xxx/CVE-2019-12420.json | 5 +++ 2019/13xxx/CVE-2019-13627.json | 5 +++ 2019/19xxx/CVE-2019-19727.json | 66 ++++++++++++++++++++++++++--- 2019/19xxx/CVE-2019-19728.json | 66 ++++++++++++++++++++++++++--- 2019/20xxx/CVE-2019-20372.json | 5 +++ 2020/5xxx/CVE-2020-5390.json | 76 +++++++++++++++++++++++++++++++--- 2020/6xxx/CVE-2020-6847.json | 5 +++ 2020/6xxx/CVE-2020-6932.json | 18 ++++++++ 2020/6xxx/CVE-2020-6933.json | 18 ++++++++ 2020/6xxx/CVE-2020-6934.json | 18 ++++++++ 2020/6xxx/CVE-2020-6935.json | 18 ++++++++ 2020/6xxx/CVE-2020-6936.json | 18 ++++++++ 2020/6xxx/CVE-2020-6937.json | 18 ++++++++ 2020/6xxx/CVE-2020-6938.json | 18 ++++++++ 2020/6xxx/CVE-2020-6939.json | 18 ++++++++ 2020/6xxx/CVE-2020-6940.json | 18 ++++++++ 2020/6xxx/CVE-2020-6941.json | 18 ++++++++ 2020/6xxx/CVE-2020-6942.json | 18 ++++++++ 2020/6xxx/CVE-2020-6943.json | 18 ++++++++ 2020/6xxx/CVE-2020-6944.json | 18 ++++++++ 2020/6xxx/CVE-2020-6945.json | 18 ++++++++ 2020/6xxx/CVE-2020-6946.json | 18 ++++++++ 2020/6xxx/CVE-2020-6947.json | 18 ++++++++ 2020/6xxx/CVE-2020-6948.json | 62 +++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6949.json | 62 +++++++++++++++++++++++++++ 28 files changed, 688 insertions(+), 20 deletions(-) create mode 100644 2020/6xxx/CVE-2020-6932.json create mode 100644 2020/6xxx/CVE-2020-6933.json create mode 100644 2020/6xxx/CVE-2020-6934.json create mode 100644 2020/6xxx/CVE-2020-6935.json create mode 100644 2020/6xxx/CVE-2020-6936.json create mode 100644 2020/6xxx/CVE-2020-6937.json create mode 100644 2020/6xxx/CVE-2020-6938.json create mode 100644 2020/6xxx/CVE-2020-6939.json create mode 100644 2020/6xxx/CVE-2020-6940.json create mode 100644 2020/6xxx/CVE-2020-6941.json create mode 100644 2020/6xxx/CVE-2020-6942.json create mode 100644 2020/6xxx/CVE-2020-6943.json create mode 100644 2020/6xxx/CVE-2020-6944.json create mode 100644 2020/6xxx/CVE-2020-6945.json create mode 100644 2020/6xxx/CVE-2020-6946.json create mode 100644 2020/6xxx/CVE-2020-6947.json create mode 100644 2020/6xxx/CVE-2020-6948.json create mode 100644 2020/6xxx/CVE-2020-6949.json diff --git a/2012/4xxx/CVE-2012-4767.json b/2012/4xxx/CVE-2012-4767.json index c30f821ad4e..f2d6f02223a 100644 --- a/2012/4xxx/CVE-2012-4767.json +++ b/2012/4xxx/CVE-2012-4767.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4767", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue exists in Safend Data Protector Agent 3.4.5586.9772 in the securitylayer.log file in the logs.9972 directory, which could let a malicious user decrypt and potentially change the Safend security policies applied to the machine." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.securityfocus.com/bid/56740", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/56740" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/118491/Safend-Data-Protector-3.4.5586.9772-Privilege-Escalation.html", + "url": "https://packetstormsecurity.com/files/118491/Safend-Data-Protector-3.4.5586.9772-Privilege-Escalation.html" + }, + { + "refsource": "MISC", + "name": "https://www.securityfocus.com/archive/1/524864", + "url": "https://www.securityfocus.com/archive/1/524864" } ] } diff --git a/2018/11xxx/CVE-2018-11805.json b/2018/11xxx/CVE-2018-11805.json index 331bc504fee..52f981827d7 100644 --- a/2018/11xxx/CVE-2018-11805.json +++ b/2018/11xxx/CVE-2018-11805.json @@ -113,6 +113,11 @@ "refsource": "MLIST", "name": "[spamassassin-users] 20191219 Re: CVE-2018-11805 fix and sa-exim", "url": "https://lists.apache.org/thread.html/0b5c73809d0690527341d940029f743807b70550050fd23ee869c5e5@%3Cusers.spamassassin.apache.org%3E" + }, + { + "refsource": "UBUNTU", + "name": "USN-4237-1", + "url": "https://usn.ubuntu.com/4237-1/" } ] }, diff --git a/2019/10xxx/CVE-2019-10161.json b/2019/10xxx/CVE-2019-10161.json index 2bd518fd058..0d48c549bab 100644 --- a/2019/10xxx/CVE-2019-10161.json +++ b/2019/10xxx/CVE-2019-10161.json @@ -61,6 +61,11 @@ "url": "https://libvirt.org/git/?p=libvirt.git;a=commit;h=aed6a032cead4386472afb24b16196579e239580", "name": "https://libvirt.org/git/?p=libvirt.git;a=commit;h=aed6a032cead4386472afb24b16196579e239580", "refsource": "CONFIRM" + }, + { + "refsource": "UBUNTU", + "name": "USN-4047-2", + "url": "https://usn.ubuntu.com/4047-2/" } ] }, diff --git a/2019/12xxx/CVE-2019-12420.json b/2019/12xxx/CVE-2019-12420.json index 66e08addc73..ae1b9794fdd 100644 --- a/2019/12xxx/CVE-2019-12420.json +++ b/2019/12xxx/CVE-2019-12420.json @@ -93,6 +93,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20191216 [SECURITY] [DLA 2037-1] spamassassin security update", "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00019.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4237-1", + "url": "https://usn.ubuntu.com/4237-1/" } ] }, diff --git a/2019/13xxx/CVE-2019-13627.json b/2019/13xxx/CVE-2019-13627.json index 494e630794f..3d65e488bec 100644 --- a/2019/13xxx/CVE-2019-13627.json +++ b/2019/13xxx/CVE-2019-13627.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200101 [SECURITY] [DLA 1931-2] libgcrypt20 regression update", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4236-1", + "url": "https://usn.ubuntu.com/4236-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19727.json b/2019/19xxx/CVE-2019-19727.json index eff15e20db3..498a25a2a76 100644 --- a/2019/19xxx/CVE-2019-19727.json +++ b/2019/19xxx/CVE-2019-19727.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19727", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19727", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.schedmd.com/pipermail/slurm-announce/", + "refsource": "MISC", + "name": "https://lists.schedmd.com/pipermail/slurm-announce/" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1155784", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1155784" + }, + { + "refsource": "CONFIRM", + "name": "https://www.schedmd.com/news.php", + "url": "https://www.schedmd.com/news.php" } ] } diff --git a/2019/19xxx/CVE-2019-19728.json b/2019/19xxx/CVE-2019-19728.json index 08f102f2888..ed5e36b6102 100644 --- a/2019/19xxx/CVE-2019-19728.json +++ b/2019/19xxx/CVE-2019-19728.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19728", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19728", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid with incorrect privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.schedmd.com/pipermail/slurm-announce/", + "refsource": "MISC", + "name": "https://lists.schedmd.com/pipermail/slurm-announce/" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1159692", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1159692" + }, + { + "refsource": "CONFIRM", + "name": "https://www.schedmd.com/news.php", + "url": "https://www.schedmd.com/news.php" } ] } diff --git a/2019/20xxx/CVE-2019-20372.json b/2019/20xxx/CVE-2019-20372.json index 877b5d2ba6a..62ac4724e61 100644 --- a/2019/20xxx/CVE-2019-20372.json +++ b/2019/20xxx/CVE-2019-20372.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e", "url": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e" + }, + { + "refsource": "UBUNTU", + "name": "USN-4235-1", + "url": "https://usn.ubuntu.com/4235-1/" } ] } diff --git a/2020/5xxx/CVE-2020-5390.json b/2020/5xxx/CVE-2020-5390.json index 3099b422469..93f1fe49460 100644 --- a/2020/5xxx/CVE-2020-5390.json +++ b/2020/5xxx/CVE-2020-5390.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-5390", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-5390", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25", + "url": "https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e", + "url": "https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0", + "url": "https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/IdentityPython/pysaml2/releases", + "url": "https://github.com/IdentityPython/pysaml2/releases" + }, + { + "refsource": "MISC", + "name": "https://pypi.org/project/pysaml2/5.0.0/", + "url": "https://pypi.org/project/pysaml2/5.0.0/" } ] } diff --git a/2020/6xxx/CVE-2020-6847.json b/2020/6xxx/CVE-2020-6847.json index 251985decd4..936d3efc8f5 100644 --- a/2020/6xxx/CVE-2020-6847.json +++ b/2020/6xxx/CVE-2020-6847.json @@ -61,6 +61,11 @@ "url": "https://github.com/3s3s/opentrade/blob/4f91391164219da30533453e1ff6800ef2ef3c6b/static_pages/js/index.js#L473", "refsource": "MISC", "name": "https://github.com/3s3s/opentrade/blob/4f91391164219da30533453e1ff6800ef2ef3c6b/static_pages/js/index.js#L473" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/3s3s/opentrade/pull/337", + "url": "https://github.com/3s3s/opentrade/pull/337" } ] }, diff --git a/2020/6xxx/CVE-2020-6932.json b/2020/6xxx/CVE-2020-6932.json new file mode 100644 index 00000000000..d183e71007d --- /dev/null +++ b/2020/6xxx/CVE-2020-6932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6933.json b/2020/6xxx/CVE-2020-6933.json new file mode 100644 index 00000000000..2530bb6adb1 --- /dev/null +++ b/2020/6xxx/CVE-2020-6933.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6933", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6934.json b/2020/6xxx/CVE-2020-6934.json new file mode 100644 index 00000000000..9408e0bf111 --- /dev/null +++ b/2020/6xxx/CVE-2020-6934.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6934", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6935.json b/2020/6xxx/CVE-2020-6935.json new file mode 100644 index 00000000000..631069052c5 --- /dev/null +++ b/2020/6xxx/CVE-2020-6935.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6935", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6936.json b/2020/6xxx/CVE-2020-6936.json new file mode 100644 index 00000000000..1e5fdbe5342 --- /dev/null +++ b/2020/6xxx/CVE-2020-6936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6937.json b/2020/6xxx/CVE-2020-6937.json new file mode 100644 index 00000000000..8eb76d190c8 --- /dev/null +++ b/2020/6xxx/CVE-2020-6937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6938.json b/2020/6xxx/CVE-2020-6938.json new file mode 100644 index 00000000000..93a6e0e384d --- /dev/null +++ b/2020/6xxx/CVE-2020-6938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6939.json b/2020/6xxx/CVE-2020-6939.json new file mode 100644 index 00000000000..ee632bcebd1 --- /dev/null +++ b/2020/6xxx/CVE-2020-6939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6940.json b/2020/6xxx/CVE-2020-6940.json new file mode 100644 index 00000000000..c044a95884b --- /dev/null +++ b/2020/6xxx/CVE-2020-6940.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6940", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6941.json b/2020/6xxx/CVE-2020-6941.json new file mode 100644 index 00000000000..1c7a0c9e4b8 --- /dev/null +++ b/2020/6xxx/CVE-2020-6941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6942.json b/2020/6xxx/CVE-2020-6942.json new file mode 100644 index 00000000000..127cfe9fe59 --- /dev/null +++ b/2020/6xxx/CVE-2020-6942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6943.json b/2020/6xxx/CVE-2020-6943.json new file mode 100644 index 00000000000..5578bbe8bf0 --- /dev/null +++ b/2020/6xxx/CVE-2020-6943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6944.json b/2020/6xxx/CVE-2020-6944.json new file mode 100644 index 00000000000..8ef5cc17d54 --- /dev/null +++ b/2020/6xxx/CVE-2020-6944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6945.json b/2020/6xxx/CVE-2020-6945.json new file mode 100644 index 00000000000..4bb606f2d62 --- /dev/null +++ b/2020/6xxx/CVE-2020-6945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6946.json b/2020/6xxx/CVE-2020-6946.json new file mode 100644 index 00000000000..fc87b6ba3a7 --- /dev/null +++ b/2020/6xxx/CVE-2020-6946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6947.json b/2020/6xxx/CVE-2020-6947.json new file mode 100644 index 00000000000..b2ad65a155c --- /dev/null +++ b/2020/6xxx/CVE-2020-6947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6948.json b/2020/6xxx/CVE-2020-6948.json new file mode 100644 index 00000000000..9446c72ee7c --- /dev/null +++ b/2020/6xxx/CVE-2020-6948.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6948", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A remote code execution issue was discovered in HashBrown CMS through 1.3.3. Server/Entity/Deployer/GitDeployer.js has a Service.AppService.exec call that mishandles the URL, repository, username, and password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/326", + "refsource": "MISC", + "name": "https://github.com/HashBrownCMS/hashbrown-cms/issues/326" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6949.json b/2020/6xxx/CVE-2020-6949.json new file mode 100644 index 00000000000..a200571dbae --- /dev/null +++ b/2020/6xxx/CVE-2020-6949.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-6949", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A privilege escalation issue was discovered in the postUser function in HashBrown CMS through 1.3.3. An editor user can change the password hash of an admin user's account, or otherwise reconfigure that account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/327", + "refsource": "MISC", + "name": "https://github.com/HashBrownCMS/hashbrown-cms/issues/327" + } + ] + } +} \ No newline at end of file