From b43d90f5af72940ac12c14ae88545fd6fcc47a0d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Jun 2020 16:01:21 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/19xxx/CVE-2019-19454.json | 7 ++++- 2019/19xxx/CVE-2019-19456.json | 7 ++++- 2020/11xxx/CVE-2020-11503.json | 56 ++++++++++++++++++++++++++++++---- 2020/14xxx/CVE-2020-14426.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14427.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14428.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14429.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14430.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14431.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14432.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14433.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14434.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14435.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14436.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14437.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14438.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14439.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14440.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14441.json | 18 +++++++++++ 2020/14xxx/CVE-2020-14442.json | 18 +++++++++++ 20 files changed, 368 insertions(+), 8 deletions(-) create mode 100644 2020/14xxx/CVE-2020-14426.json create mode 100644 2020/14xxx/CVE-2020-14427.json create mode 100644 2020/14xxx/CVE-2020-14428.json create mode 100644 2020/14xxx/CVE-2020-14429.json create mode 100644 2020/14xxx/CVE-2020-14430.json create mode 100644 2020/14xxx/CVE-2020-14431.json create mode 100644 2020/14xxx/CVE-2020-14432.json create mode 100644 2020/14xxx/CVE-2020-14433.json create mode 100644 2020/14xxx/CVE-2020-14434.json create mode 100644 2020/14xxx/CVE-2020-14435.json create mode 100644 2020/14xxx/CVE-2020-14436.json create mode 100644 2020/14xxx/CVE-2020-14437.json create mode 100644 2020/14xxx/CVE-2020-14438.json create mode 100644 2020/14xxx/CVE-2020-14439.json create mode 100644 2020/14xxx/CVE-2020-14440.json create mode 100644 2020/14xxx/CVE-2020-14441.json create mode 100644 2020/14xxx/CVE-2020-14442.json diff --git a/2019/19xxx/CVE-2019-19454.json b/2019/19xxx/CVE-2019-19454.json index 3d8fe66f2d9..c24fd3ff53a 100644 --- a/2019/19xxx/CVE-2019-19454.json +++ b/2019/19xxx/CVE-2019-19454.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An arbitrary file download was found in the \"Download Log\" functionality of Wowza Streaming Engine <= 4.x.x" + "value": "An arbitrary file download was found in the \"Download Log\" functionality of Wowza Streaming Engine <= 4.x.x. This issue was resolved in Wowza Streaming Engine 4.8.0." } ] }, @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.telecomitalia.com/it/innovazione/servizi-digitali/cybersecurity/red-team.html", "url": "https://www.telecomitalia.com/it/innovazione/servizi-digitali/cybersecurity/red-team.html" + }, + { + "refsource": "MISC", + "name": "https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/master/wowza-streaming-engine/CVE-2019-19454.txt", + "url": "https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/master/wowza-streaming-engine/CVE-2019-19454.txt" } ] } diff --git a/2019/19xxx/CVE-2019-19456.json b/2019/19xxx/CVE-2019-19456.json index 0e6f0b971b7..6ee5c3f04a1 100644 --- a/2019/19xxx/CVE-2019-19456.json +++ b/2019/19xxx/CVE-2019-19456.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A Reflected XSS was found in the server selection box inside the login page at: enginemanager/loginfailed.html in Wowza Streaming Engine <= 4.x.x." + "value": "A Reflected XSS was found in the server selection box inside the login page at: enginemanager/loginfailed.html in Wowza Streaming Engine <= 4.x.x. This issue was resolved in Wowza Streaming Engine 4.8.0." } ] }, @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.telecomitalia.com/it/innovazione/servizi-digitali/cybersecurity/red-team.html", "url": "https://www.telecomitalia.com/it/innovazione/servizi-digitali/cybersecurity/red-team.html" + }, + { + "refsource": "MISC", + "name": "https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/master/wowza-streaming-engine/CVE-2019-19456.txt", + "url": "https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/master/wowza-streaming-engine/CVE-2019-19456.txt" } ] } diff --git a/2020/11xxx/CVE-2020-11503.json b/2020/11xxx/CVE-2020-11503.json index ea1c6123aca..3b70503dd2e 100644 --- a/2020/11xxx/CVE-2020-11503.json +++ b/2020/11xxx/CVE-2020-11503.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11503", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11503", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503", + "url": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503" } ] } diff --git a/2020/14xxx/CVE-2020-14426.json b/2020/14xxx/CVE-2020-14426.json new file mode 100644 index 00000000000..af4e18d18a0 --- /dev/null +++ b/2020/14xxx/CVE-2020-14426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14427.json b/2020/14xxx/CVE-2020-14427.json new file mode 100644 index 00000000000..b8c1f54d719 --- /dev/null +++ b/2020/14xxx/CVE-2020-14427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14428.json b/2020/14xxx/CVE-2020-14428.json new file mode 100644 index 00000000000..3316538f7e8 --- /dev/null +++ b/2020/14xxx/CVE-2020-14428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14429.json b/2020/14xxx/CVE-2020-14429.json new file mode 100644 index 00000000000..4968ec7b0dc --- /dev/null +++ b/2020/14xxx/CVE-2020-14429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14430.json b/2020/14xxx/CVE-2020-14430.json new file mode 100644 index 00000000000..db0f825b861 --- /dev/null +++ b/2020/14xxx/CVE-2020-14430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14431.json b/2020/14xxx/CVE-2020-14431.json new file mode 100644 index 00000000000..e2e5d5b75e1 --- /dev/null +++ b/2020/14xxx/CVE-2020-14431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14432.json b/2020/14xxx/CVE-2020-14432.json new file mode 100644 index 00000000000..e4dc541843a --- /dev/null +++ b/2020/14xxx/CVE-2020-14432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14433.json b/2020/14xxx/CVE-2020-14433.json new file mode 100644 index 00000000000..c1cc54d5c20 --- /dev/null +++ b/2020/14xxx/CVE-2020-14433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14434.json b/2020/14xxx/CVE-2020-14434.json new file mode 100644 index 00000000000..e96e7dcad39 --- /dev/null +++ b/2020/14xxx/CVE-2020-14434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14435.json b/2020/14xxx/CVE-2020-14435.json new file mode 100644 index 00000000000..431a9633b6a --- /dev/null +++ b/2020/14xxx/CVE-2020-14435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14436.json b/2020/14xxx/CVE-2020-14436.json new file mode 100644 index 00000000000..1ecfa1640e6 --- /dev/null +++ b/2020/14xxx/CVE-2020-14436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14437.json b/2020/14xxx/CVE-2020-14437.json new file mode 100644 index 00000000000..c6501a7222d --- /dev/null +++ b/2020/14xxx/CVE-2020-14437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14438.json b/2020/14xxx/CVE-2020-14438.json new file mode 100644 index 00000000000..c8569947114 --- /dev/null +++ b/2020/14xxx/CVE-2020-14438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14439.json b/2020/14xxx/CVE-2020-14439.json new file mode 100644 index 00000000000..bf309a9a63e --- /dev/null +++ b/2020/14xxx/CVE-2020-14439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14440.json b/2020/14xxx/CVE-2020-14440.json new file mode 100644 index 00000000000..cfe51525d30 --- /dev/null +++ b/2020/14xxx/CVE-2020-14440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14441.json b/2020/14xxx/CVE-2020-14441.json new file mode 100644 index 00000000000..7e18085bede --- /dev/null +++ b/2020/14xxx/CVE-2020-14441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14442.json b/2020/14xxx/CVE-2020-14442.json new file mode 100644 index 00000000000..c4da74d2e3f --- /dev/null +++ b/2020/14xxx/CVE-2020-14442.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14442", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file