From 6aa048060b83d8a176d6a64d1073a28277c6fdf4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 28 May 2020 18:01:20 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/7xxx/CVE-2019-7192.json | 5 +++++ 2019/7xxx/CVE-2019-7193.json | 5 +++++ 2019/7xxx/CVE-2019-7194.json | 5 +++++ 2019/7xxx/CVE-2019-7195.json | 5 +++++ 2020/11xxx/CVE-2020-11651.json | 5 +++++ 2020/11xxx/CVE-2020-11652.json | 5 +++++ 2020/12xxx/CVE-2020-12388.json | 5 +++++ 2020/13xxx/CVE-2020-13656.json | 18 ++++++++++++++++++ 2020/13xxx/CVE-2020-13657.json | 18 ++++++++++++++++++ 2020/13xxx/CVE-2020-13658.json | 18 ++++++++++++++++++ 10 files changed, 89 insertions(+) create mode 100644 2020/13xxx/CVE-2020-13656.json create mode 100644 2020/13xxx/CVE-2020-13657.json create mode 100644 2020/13xxx/CVE-2020-13658.json diff --git a/2019/7xxx/CVE-2019-7192.json b/2019/7xxx/CVE-2019-7192.json index 7da52cc5522..58f9785feef 100644 --- a/2019/7xxx/CVE-2019-7192.json +++ b/2019/7xxx/CVE-2019-7192.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25", "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html" } ] }, diff --git a/2019/7xxx/CVE-2019-7193.json b/2019/7xxx/CVE-2019-7193.json index 9afb009bd53..37d88e2fac3 100644 --- a/2019/7xxx/CVE-2019-7193.json +++ b/2019/7xxx/CVE-2019-7193.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25", "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html" } ] }, diff --git a/2019/7xxx/CVE-2019-7194.json b/2019/7xxx/CVE-2019-7194.json index f860a4d8da8..750282b1c8e 100644 --- a/2019/7xxx/CVE-2019-7194.json +++ b/2019/7xxx/CVE-2019-7194.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25", "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html" } ] }, diff --git a/2019/7xxx/CVE-2019-7195.json b/2019/7xxx/CVE-2019-7195.json index 10533604f9d..3d0a5b96d84 100644 --- a/2019/7xxx/CVE-2019-7195.json +++ b/2019/7xxx/CVE-2019-7195.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25", "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11651.json b/2020/11xxx/CVE-2020-11651.json index c77dc132c5e..db40c71e99b 100644 --- a/2020/11xxx/CVE-2020-11651.json +++ b/2020/11xxx/CVE-2020-11651.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html" + }, + { + "refsource": "CISCO", + "name": "20200528 SaltStack FrameWork Vulnerabilities Affecting Cisco Products", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG" } ] } diff --git a/2020/11xxx/CVE-2020-11652.json b/2020/11xxx/CVE-2020-11652.json index 13e3fea0eb6..b0ea24ebb10 100644 --- a/2020/11xxx/CVE-2020-11652.json +++ b/2020/11xxx/CVE-2020-11652.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html" + }, + { + "refsource": "CISCO", + "name": "20200528 SaltStack FrameWork Vulnerabilities Affecting Cisco Products", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG" } ] } diff --git a/2020/12xxx/CVE-2020-12388.json b/2020/12xxx/CVE-2020-12388.json index 2891600f4eb..2bc0f234717 100644 --- a/2020/12xxx/CVE-2020-12388.json +++ b/2020/12xxx/CVE-2020-12388.json @@ -70,6 +70,11 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1618911", "refsource": "MISC", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1618911" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html", + "url": "http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13656.json b/2020/13xxx/CVE-2020-13656.json new file mode 100644 index 00000000000..3a2ddda90e0 --- /dev/null +++ b/2020/13xxx/CVE-2020-13656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13657.json b/2020/13xxx/CVE-2020-13657.json new file mode 100644 index 00000000000..fdcb893aa2a --- /dev/null +++ b/2020/13xxx/CVE-2020-13657.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13657", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13658.json b/2020/13xxx/CVE-2020-13658.json new file mode 100644 index 00000000000..e83d78e1b9f --- /dev/null +++ b/2020/13xxx/CVE-2020-13658.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13658", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file