From f7799f9789f1a6750d42c162998c0b5bce4a548b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 24 Sep 2020 14:01:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15304.json | 7 +++- 2020/16xxx/CVE-2020-16147.json | 56 +++++++++++++++++++++++++++---- 2020/16xxx/CVE-2020-16148.json | 56 +++++++++++++++++++++++++++---- 2020/22xxx/CVE-2020-22453.json | 61 ++++++++++++++++++++++++++++++---- 2020/26xxx/CVE-2020-26062.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26063.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26064.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26065.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26066.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26067.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26068.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26069.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26070.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26071.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26072.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26073.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26074.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26075.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26076.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26077.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26078.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26079.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26080.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26081.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26082.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26083.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26084.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26085.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26086.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26087.json | 18 ++++++++++ 2020/26xxx/CVE-2020-26088.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6020.json | 50 ++++++++++++++++++++++++++-- 32 files changed, 694 insertions(+), 22 deletions(-) create mode 100644 2020/26xxx/CVE-2020-26062.json create mode 100644 2020/26xxx/CVE-2020-26063.json create mode 100644 2020/26xxx/CVE-2020-26064.json create mode 100644 2020/26xxx/CVE-2020-26065.json create mode 100644 2020/26xxx/CVE-2020-26066.json create mode 100644 2020/26xxx/CVE-2020-26067.json create mode 100644 2020/26xxx/CVE-2020-26068.json create mode 100644 2020/26xxx/CVE-2020-26069.json create mode 100644 2020/26xxx/CVE-2020-26070.json create mode 100644 2020/26xxx/CVE-2020-26071.json create mode 100644 2020/26xxx/CVE-2020-26072.json create mode 100644 2020/26xxx/CVE-2020-26073.json create mode 100644 2020/26xxx/CVE-2020-26074.json create mode 100644 2020/26xxx/CVE-2020-26075.json create mode 100644 2020/26xxx/CVE-2020-26076.json create mode 100644 2020/26xxx/CVE-2020-26077.json create mode 100644 2020/26xxx/CVE-2020-26078.json create mode 100644 2020/26xxx/CVE-2020-26079.json create mode 100644 2020/26xxx/CVE-2020-26080.json create mode 100644 2020/26xxx/CVE-2020-26081.json create mode 100644 2020/26xxx/CVE-2020-26082.json create mode 100644 2020/26xxx/CVE-2020-26083.json create mode 100644 2020/26xxx/CVE-2020-26084.json create mode 100644 2020/26xxx/CVE-2020-26085.json create mode 100644 2020/26xxx/CVE-2020-26086.json create mode 100644 2020/26xxx/CVE-2020-26087.json create mode 100644 2020/26xxx/CVE-2020-26088.json diff --git a/2019/15xxx/CVE-2019-15304.json b/2019/15xxx/CVE-2019-15304.json index 30cf0e35372..daa05fb0b8a 100644 --- a/2019/15xxx/CVE-2019-15304.json +++ b/2019/15xxx/CVE-2019-15304.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Lierda Grill Temperature Monitor V1.00_50006 has a default password of admin for the admin account, which allows an attacker to cause a Denial of Service or Information Disclosure via the undocumented access-point configuration page located on the device. NOTE: this device also ships with ProGrade branding." + "value": "Lierda Grill Temperature Monitor V1.00_50006 has a default password of admin for the admin account, which allows an attacker to cause a Denial of Service or Information Disclosure via the undocumented access-point configuration page located on the device. This wifi thermometer app requests and requires excessive permissions to operate such as Fine GPS location, camera, applists, Serial number, IMEI. In addition to the \"backdoor\" login access for \"admin\" purposes, this accompanying app also establishes connections with several china based URLs to include Alibaba cloud computing. NOTE: this device also ships with ProGrade branding." } ] }, @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154221/ProGrade-Lierda-Grill-Temperature-1.00_50006-Hardcoded-Credentials.html", "url": "http://packetstormsecurity.com/files/154221/ProGrade-Lierda-Grill-Temperature-1.00_50006-Hardcoded-Credentials.html" + }, + { + "refsource": "MISC", + "name": "https://www.joesandbox.com/analysis/287596/0/html", + "url": "https://www.joesandbox.com/analysis/287596/0/html" } ] } diff --git a/2020/16xxx/CVE-2020-16147.json b/2020/16xxx/CVE-2020-16147.json index f4537acabf1..1a4690fef18 100644 --- a/2020/16xxx/CVE-2020-16147.json +++ b/2020/16xxx/CVE-2020-16147.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-16147", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-16147", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The login page in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via Unauthenticated code injection over the network." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://podalirius.net/cves/2020-16147/", + "url": "https://podalirius.net/cves/2020-16147/" } ] } diff --git a/2020/16xxx/CVE-2020-16148.json b/2020/16xxx/CVE-2020-16148.json index 3be25b7da5a..1cb21ba3780 100644 --- a/2020/16xxx/CVE-2020-16148.json +++ b/2020/16xxx/CVE-2020-16148.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-16148", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-16148", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The ping page of the administration panel in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via authenticated code injection over the network." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://podalirius.net/cves/2020-16148/", + "url": "https://podalirius.net/cves/2020-16148/" } ] } diff --git a/2020/22xxx/CVE-2020-22453.json b/2020/22xxx/CVE-2020-22453.json index 6dd9016b103..6ff5ee79978 100644 --- a/2020/22xxx/CVE-2020-22453.json +++ b/2020/22xxx/CVE-2020-22453.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-22453", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-22453", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Untis WebUntis before 2020.9.6 allows XSS in multiple functions that store information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://help.untis.at/hc/en-150/articles/360008456699", + "refsource": "MISC", + "name": "https://help.untis.at/hc/en-150/articles/360008456699" + }, + { + "url": "https://robin.meis.space/2020/03/11/notenmanipulation-in-elektronischen-klassenbuchern/", + "refsource": "MISC", + "name": "https://robin.meis.space/2020/03/11/notenmanipulation-in-elektronischen-klassenbuchern/" } ] } diff --git a/2020/26xxx/CVE-2020-26062.json b/2020/26xxx/CVE-2020-26062.json new file mode 100644 index 00000000000..5dccebe6c40 --- /dev/null +++ b/2020/26xxx/CVE-2020-26062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26063.json b/2020/26xxx/CVE-2020-26063.json new file mode 100644 index 00000000000..3f53036c127 --- /dev/null +++ b/2020/26xxx/CVE-2020-26063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26064.json b/2020/26xxx/CVE-2020-26064.json new file mode 100644 index 00000000000..7c3840be4db --- /dev/null +++ b/2020/26xxx/CVE-2020-26064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26065.json b/2020/26xxx/CVE-2020-26065.json new file mode 100644 index 00000000000..231e32f5249 --- /dev/null +++ b/2020/26xxx/CVE-2020-26065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26066.json b/2020/26xxx/CVE-2020-26066.json new file mode 100644 index 00000000000..f5a3ff3c115 --- /dev/null +++ b/2020/26xxx/CVE-2020-26066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26067.json b/2020/26xxx/CVE-2020-26067.json new file mode 100644 index 00000000000..9bac6ba285a --- /dev/null +++ b/2020/26xxx/CVE-2020-26067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26068.json b/2020/26xxx/CVE-2020-26068.json new file mode 100644 index 00000000000..1df01b0c10b --- /dev/null +++ b/2020/26xxx/CVE-2020-26068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26069.json b/2020/26xxx/CVE-2020-26069.json new file mode 100644 index 00000000000..efdc30eb830 --- /dev/null +++ b/2020/26xxx/CVE-2020-26069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26070.json b/2020/26xxx/CVE-2020-26070.json new file mode 100644 index 00000000000..b0fe0971cfb --- /dev/null +++ b/2020/26xxx/CVE-2020-26070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26071.json b/2020/26xxx/CVE-2020-26071.json new file mode 100644 index 00000000000..95f2fad8173 --- /dev/null +++ b/2020/26xxx/CVE-2020-26071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26072.json b/2020/26xxx/CVE-2020-26072.json new file mode 100644 index 00000000000..13bde4dd09e --- /dev/null +++ b/2020/26xxx/CVE-2020-26072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26073.json b/2020/26xxx/CVE-2020-26073.json new file mode 100644 index 00000000000..d7444fbbf44 --- /dev/null +++ b/2020/26xxx/CVE-2020-26073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26074.json b/2020/26xxx/CVE-2020-26074.json new file mode 100644 index 00000000000..7179a6b7762 --- /dev/null +++ b/2020/26xxx/CVE-2020-26074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26075.json b/2020/26xxx/CVE-2020-26075.json new file mode 100644 index 00000000000..36d821efeaf --- /dev/null +++ b/2020/26xxx/CVE-2020-26075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26076.json b/2020/26xxx/CVE-2020-26076.json new file mode 100644 index 00000000000..21163b50ae9 --- /dev/null +++ b/2020/26xxx/CVE-2020-26076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26077.json b/2020/26xxx/CVE-2020-26077.json new file mode 100644 index 00000000000..06209fb5de2 --- /dev/null +++ b/2020/26xxx/CVE-2020-26077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26078.json b/2020/26xxx/CVE-2020-26078.json new file mode 100644 index 00000000000..ba16c42c232 --- /dev/null +++ b/2020/26xxx/CVE-2020-26078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26079.json b/2020/26xxx/CVE-2020-26079.json new file mode 100644 index 00000000000..f145726b59c --- /dev/null +++ b/2020/26xxx/CVE-2020-26079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26080.json b/2020/26xxx/CVE-2020-26080.json new file mode 100644 index 00000000000..482c6f4d420 --- /dev/null +++ b/2020/26xxx/CVE-2020-26080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26081.json b/2020/26xxx/CVE-2020-26081.json new file mode 100644 index 00000000000..0e3a30ec580 --- /dev/null +++ b/2020/26xxx/CVE-2020-26081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26082.json b/2020/26xxx/CVE-2020-26082.json new file mode 100644 index 00000000000..9b63de65571 --- /dev/null +++ b/2020/26xxx/CVE-2020-26082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26083.json b/2020/26xxx/CVE-2020-26083.json new file mode 100644 index 00000000000..bf5d45a7f22 --- /dev/null +++ b/2020/26xxx/CVE-2020-26083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26084.json b/2020/26xxx/CVE-2020-26084.json new file mode 100644 index 00000000000..8a198347920 --- /dev/null +++ b/2020/26xxx/CVE-2020-26084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26085.json b/2020/26xxx/CVE-2020-26085.json new file mode 100644 index 00000000000..d9ad6293612 --- /dev/null +++ b/2020/26xxx/CVE-2020-26085.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26085", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26086.json b/2020/26xxx/CVE-2020-26086.json new file mode 100644 index 00000000000..4ce625b5eb0 --- /dev/null +++ b/2020/26xxx/CVE-2020-26086.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26086", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26087.json b/2020/26xxx/CVE-2020-26087.json new file mode 100644 index 00000000000..edbbe58a427 --- /dev/null +++ b/2020/26xxx/CVE-2020-26087.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26087", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26088.json b/2020/26xxx/CVE-2020-26088.json new file mode 100644 index 00000000000..ed4c43fc2c0 --- /dev/null +++ b/2020/26xxx/CVE-2020-26088.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26088", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6020.json b/2020/6xxx/CVE-2020-6020.json index ee65ba65700..c668b927e13 100644 --- a/2020/6xxx/CVE-2020-6020.json +++ b/2020/6xxx/CVE-2020-6020.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6020", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@checkpoint.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ICA Management Portal", + "version": { + "version_data": [ + { + "version_value": "before JHFs R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://supportcontent.checkpoint.com/solutions?id=sk142952", + "url": "https://supportcontent.checkpoint.com/solutions?id=sk142952" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Check Point Security Management's Internal CA web management before Jumbo HFAs R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38, can be manipulated to run commands as a high privileged user or crash, due to weak input validation on inputs by a trusted management administrator." } ] }