From e88f2ad3a97e214b8013de038c58802f07ff64df Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 5 Oct 2020 20:01:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/20xxx/CVE-2018-20020.json | 5 +++++ 2018/20xxx/CVE-2018-20021.json | 5 +++++ 2018/20xxx/CVE-2018-20022.json | 5 +++++ 2018/20xxx/CVE-2018-20024.json | 5 +++++ 2020/24xxx/CVE-2020-24620.json | 2 +- 2020/26xxx/CVE-2020-26563.json | 18 ++++++++++++++++++ 2020/26xxx/CVE-2020-26564.json | 18 ++++++++++++++++++ 2020/26xxx/CVE-2020-26565.json | 18 ++++++++++++++++++ 2020/26xxx/CVE-2020-26566.json | 18 ++++++++++++++++++ 9 files changed, 93 insertions(+), 1 deletion(-) create mode 100644 2020/26xxx/CVE-2020-26563.json create mode 100644 2020/26xxx/CVE-2020-26564.json create mode 100644 2020/26xxx/CVE-2020-26565.json create mode 100644 2020/26xxx/CVE-2020-26566.json diff --git a/2018/20xxx/CVE-2018-20020.json b/2018/20xxx/CVE-2018-20020.json index 348399d9cb2..f46f9e7ace0 100644 --- a/2018/20xxx/CVE-2018-20020.json +++ b/2018/20xxx/CVE-2018-20020.json @@ -96,6 +96,11 @@ "refsource": "UBUNTU", "name": "USN-4547-1", "url": "https://usn.ubuntu.com/4547-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4547-2", + "url": "https://usn.ubuntu.com/4547-2/" } ] } diff --git a/2018/20xxx/CVE-2018-20021.json b/2018/20xxx/CVE-2018-20021.json index 0344fcbea0e..90b8f47410c 100644 --- a/2018/20xxx/CVE-2018-20021.json +++ b/2018/20xxx/CVE-2018-20021.json @@ -101,6 +101,11 @@ "refsource": "UBUNTU", "name": "USN-4547-1", "url": "https://usn.ubuntu.com/4547-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4547-2", + "url": "https://usn.ubuntu.com/4547-2/" } ] } diff --git a/2018/20xxx/CVE-2018-20022.json b/2018/20xxx/CVE-2018-20022.json index 4f2ca828a19..c4b6b6459a2 100644 --- a/2018/20xxx/CVE-2018-20022.json +++ b/2018/20xxx/CVE-2018-20022.json @@ -101,6 +101,11 @@ "refsource": "UBUNTU", "name": "USN-4547-1", "url": "https://usn.ubuntu.com/4547-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4547-2", + "url": "https://usn.ubuntu.com/4547-2/" } ] } diff --git a/2018/20xxx/CVE-2018-20024.json b/2018/20xxx/CVE-2018-20024.json index fd2f029a293..68b3e95bbea 100644 --- a/2018/20xxx/CVE-2018-20024.json +++ b/2018/20xxx/CVE-2018-20024.json @@ -96,6 +96,11 @@ "refsource": "UBUNTU", "name": "USN-4547-1", "url": "https://usn.ubuntu.com/4547-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4547-2", + "url": "https://usn.ubuntu.com/4547-2/" } ] } diff --git a/2020/24xxx/CVE-2020-24620.json b/2020/24xxx/CVE-2020-24620.json index 2add072a955..d162cdc2d83 100644 --- a/2020/24xxx/CVE-2020-24620.json +++ b/2020/24xxx/CVE-2020-24620.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Unisys Stealth(core) before 4.0.132 stores Passwords in a Recoverable Format." + "value": "Unisys Stealth(core) before 4.0.134 stores passwords in a recoverable format. Therefore, a search of Enterprise Manager can potentially reveal credentials." } ] }, diff --git a/2020/26xxx/CVE-2020-26563.json b/2020/26xxx/CVE-2020-26563.json new file mode 100644 index 00000000000..18d7b6e47c1 --- /dev/null +++ b/2020/26xxx/CVE-2020-26563.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26563", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26564.json b/2020/26xxx/CVE-2020-26564.json new file mode 100644 index 00000000000..45c1dcdcf90 --- /dev/null +++ b/2020/26xxx/CVE-2020-26564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26564", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26565.json b/2020/26xxx/CVE-2020-26565.json new file mode 100644 index 00000000000..32e56ba9ca1 --- /dev/null +++ b/2020/26xxx/CVE-2020-26565.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26565", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26566.json b/2020/26xxx/CVE-2020-26566.json new file mode 100644 index 00000000000..36605e95164 --- /dev/null +++ b/2020/26xxx/CVE-2020-26566.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26566", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file