diff --git a/2018/6xxx/CVE-2018-6594.json b/2018/6xxx/CVE-2018-6594.json index f4f4d434bbf..5118e7c02ca 100644 --- a/2018/6xxx/CVE-2018-6594.json +++ b/2018/6xxx/CVE-2018-6594.json @@ -76,6 +76,11 @@ "name": "USN-3616-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3616-2/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-62", + "url": "https://security.gentoo.org/glsa/202007-62" } ] } diff --git a/2020/16xxx/CVE-2020-16252.json b/2020/16xxx/CVE-2020-16252.json new file mode 100644 index 00000000000..ccdf99a2d5c --- /dev/null +++ b/2020/16xxx/CVE-2020-16252.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16252", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16253.json b/2020/16xxx/CVE-2020-16253.json new file mode 100644 index 00000000000..cc936b4d722 --- /dev/null +++ b/2020/16xxx/CVE-2020-16253.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16253", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16254.json b/2020/16xxx/CVE-2020-16254.json new file mode 100644 index 00000000000..92585f315f2 --- /dev/null +++ b/2020/16xxx/CVE-2020-16254.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16254", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8213.json b/2020/8xxx/CVE-2020-8213.json index 39c021fae2e..f66bf89b7c8 100644 --- a/2020/8xxx/CVE-2020-8213.json +++ b/2020/8xxx/CVE-2020-8213.json @@ -11,7 +11,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", + "vendor_name": "UniFi", "product": { "product_data": [ { @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "Fixed on UniFi Protect 1.13.4-beta.2" + "version_value": "Fixed in v1.13.4-beta.5" } ] } @@ -46,13 +46,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://community.ui.com/releases/UniFi-Protect-1-13-4-beta-2/405d4cf9-e538-48d1-8825-36657a692f3f", - "url": "https://community.ui.com/releases/UniFi-Protect-1-13-4-beta-2/405d4cf9-e538-48d1-8825-36657a692f3f" - }, - { - "refsource": "MISC", - "name": "https://community.ui.com/questions/CloudKey-Plus-CK-How-to-get-on-the-beta-release-channel/c26acdf8-321c-49b6-8f0d-9d7d99bf6aee", - "url": "https://community.ui.com/questions/CloudKey-Plus-CK-How-to-get-on-the-beta-release-channel/c26acdf8-321c-49b6-8f0d-9d7d99bf6aee" + "name": "https://community.ui.com/releases/Security-advisory-bulletin-013-013/56d4d616-4afd-40ee-863f-319b7126ed84", + "url": "https://community.ui.com/releases/Security-advisory-bulletin-013-013/56d4d616-4afd-40ee-863f-319b7126ed84" } ] }, @@ -60,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "An information exposure vulnerability exists in UniFi Protect v1.13.3 and prior that allowed unauthenticated attackers access to valid usernames for the UniFi Protect web application via HTTP response code and response timing." + "value": "An information exposure vulnerability exists in UniFi Protect before v1.13.4-beta.5 that allowed unauthenticated attackers access to valid usernames for the UniFi Protect web application via HTTP response code and response timing." } ] }