diff --git a/2019/11xxx/CVE-2019-11556.json b/2019/11xxx/CVE-2019-11556.json index 62c199f3e95..5a413984588 100644 --- a/2019/11xxx/CVE-2019-11556.json +++ b/2019/11xxx/CVE-2019-11556.json @@ -71,6 +71,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1765", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1810", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html" } ] } diff --git a/2019/19xxx/CVE-2019-19917.json b/2019/19xxx/CVE-2019-19917.json index 66605d0c15f..3873a084726 100644 --- a/2019/19xxx/CVE-2019-19917.json +++ b/2019/19xxx/CVE-2019-19917.json @@ -81,6 +81,16 @@ "refsource": "FEDORA", "name": "FEDORA-2020-81c80ff1ed", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1813", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1812", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" } ] } diff --git a/2019/19xxx/CVE-2019-19918.json b/2019/19xxx/CVE-2019-19918.json index 8ea9cc7a5fb..80e28a1834e 100644 --- a/2019/19xxx/CVE-2019-19918.json +++ b/2019/19xxx/CVE-2019-19918.json @@ -81,6 +81,16 @@ "refsource": "FEDORA", "name": "FEDORA-2020-81c80ff1ed", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGZKTKGRJTQE43SFU77X5QJHKXTTOJYB/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1813", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1812", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" } ] } diff --git a/2020/10xxx/CVE-2020-10802.json b/2020/10xxx/CVE-2020-10802.json index 36d4d7df01b..0f383dbd2b4 100644 --- a/2020/10xxx/CVE-2020-10802.json +++ b/2020/10xxx/CVE-2020-10802.json @@ -86,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-e60ce63865", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1806", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" } ] } diff --git a/2020/10xxx/CVE-2020-10803.json b/2020/10xxx/CVE-2020-10803.json index 252020c1661..6514fca7aab 100644 --- a/2020/10xxx/CVE-2020-10803.json +++ b/2020/10xxx/CVE-2020-10803.json @@ -86,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-e60ce63865", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1806", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" } ] } diff --git a/2020/10xxx/CVE-2020-10804.json b/2020/10xxx/CVE-2020-10804.json index bd563062a17..80e63d446c9 100644 --- a/2020/10xxx/CVE-2020-10804.json +++ b/2020/10xxx/CVE-2020-10804.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-e60ce63865", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1806", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" } ] } diff --git a/2020/14xxx/CVE-2020-14323.json b/2020/14xxx/CVE-2020-14323.json index 249fde745c0..a5664f887f9 100644 --- a/2020/14xxx/CVE-2020-14323.json +++ b/2020/14xxx/CVE-2020-14323.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://www.samba.org/samba/security/CVE-2020-14323.html", "url": "https://www.samba.org/samba/security/CVE-2020-14323.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1811", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14750.json b/2020/14xxx/CVE-2020-14750.json index 0570afacabf..7df3cfc890b 100644 --- a/2020/14xxx/CVE-2020-14750.json +++ b/2020/14xxx/CVE-2020-14750.json @@ -1,83 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secalert_us@oracle.com", - "ID": "CVE-2020-14750" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "WebLogic Server", - "version": { - "version_data": [ - { - "version_value": "10.3.6.0.0", - "version_affected": "=" - }, - { - "version_value": "12.1.3.0.0", - "version_affected": "=" - }, - { - "version_value": "12.2.1.3.0", - "version_affected": "=" - }, - { - "version_value": "12.2.1.4.0", - "version_affected": "=" - }, - { - "version_value": "14.1.1.0.0", - "version_affected": "=" - } - ] - } - } - ] - }, - "vendor_name": "Oracle Corporation" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." - } - ] - }, - "impact": { - "cvss": { - "baseScore": "9.8", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.1" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server." - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.oracle.com/security-alerts/alert-cve-2020-14750.html" - } - ] - } + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secalert_us@oracle.com", + "ID": "CVE-2020-14750", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "WebLogic Server", + "version": { + "version_data": [ + { + "version_value": "10.3.6.0.0", + "version_affected": "=" + }, + { + "version_value": "12.1.3.0.0", + "version_affected": "=" + }, + { + "version_value": "12.2.1.3.0", + "version_affected": "=" + }, + { + "version_value": "12.2.1.4.0", + "version_affected": "=" + }, + { + "version_value": "14.1.1.0.0", + "version_affected": "=" + } + ] + } + } + ] + }, + "vendor_name": "Oracle Corporation" + } + ] + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "9.8", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/alert-cve-2020-14750.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/alert-cve-2020-14750.html" + } + ] + } } \ No newline at end of file diff --git a/2020/15xxx/CVE-2020-15229.json b/2020/15xxx/CVE-2020-15229.json index 44276b2ffad..e7356211754 100644 --- a/2020/15xxx/CVE-2020-15229.json +++ b/2020/15xxx/CVE-2020-15229.json @@ -98,6 +98,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1770", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1814", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html" } ] }, diff --git a/2020/15xxx/CVE-2020-15250.json b/2020/15xxx/CVE-2020-15250.json index 2449fb9d0c8..6a64136f365 100644 --- a/2020/15xxx/CVE-2020-15250.json +++ b/2020/15xxx/CVE-2020-15250.json @@ -133,6 +133,11 @@ "name": "https://github.com/junit-team/junit4/issues/1676", "refsource": "MISC", "url": "https://github.com/junit-team/junit4/issues/1676" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20201101 [SECURITY] [DLA 2426-1] junit4 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26934.json b/2020/26xxx/CVE-2020-26934.json index aa07ba389c7..f363dd40c10 100644 --- a/2020/26xxx/CVE-2020-26934.json +++ b/2020/26xxx/CVE-2020-26934.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1806", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" } ] } diff --git a/2020/26xxx/CVE-2020-26935.json b/2020/26xxx/CVE-2020-26935.json index f49edeba716..c9eb8121b58 100644 --- a/2020/26xxx/CVE-2020-26935.json +++ b/2020/26xxx/CVE-2020-26935.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1806", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" } ] } diff --git a/2020/28xxx/CVE-2020-28046.json b/2020/28xxx/CVE-2020-28046.json index 60dd8387872..cd05d9f31a1 100644 --- a/2020/28xxx/CVE-2020-28046.json +++ b/2020/28xxx/CVE-2020-28046.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch, a related issue to CVE-2019-11360." + "value": "An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch." } ] }, diff --git a/2020/28xxx/CVE-2020-28133.json b/2020/28xxx/CVE-2020-28133.json new file mode 100644 index 00000000000..6933be48ae1 --- /dev/null +++ b/2020/28xxx/CVE-2020-28133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28134.json b/2020/28xxx/CVE-2020-28134.json new file mode 100644 index 00000000000..46d670d258b --- /dev/null +++ b/2020/28xxx/CVE-2020-28134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28135.json b/2020/28xxx/CVE-2020-28135.json new file mode 100644 index 00000000000..41d869bd4d2 --- /dev/null +++ b/2020/28xxx/CVE-2020-28135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28136.json b/2020/28xxx/CVE-2020-28136.json new file mode 100644 index 00000000000..c87f27de3ed --- /dev/null +++ b/2020/28xxx/CVE-2020-28136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28137.json b/2020/28xxx/CVE-2020-28137.json new file mode 100644 index 00000000000..7dbeb87237f --- /dev/null +++ b/2020/28xxx/CVE-2020-28137.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28137", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28138.json b/2020/28xxx/CVE-2020-28138.json new file mode 100644 index 00000000000..f162367fcff --- /dev/null +++ b/2020/28xxx/CVE-2020-28138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28139.json b/2020/28xxx/CVE-2020-28139.json new file mode 100644 index 00000000000..54a69030a92 --- /dev/null +++ b/2020/28xxx/CVE-2020-28139.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28139", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28140.json b/2020/28xxx/CVE-2020-28140.json new file mode 100644 index 00000000000..e1c707dddcf --- /dev/null +++ b/2020/28xxx/CVE-2020-28140.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28140", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28141.json b/2020/28xxx/CVE-2020-28141.json new file mode 100644 index 00000000000..756d7dfc7e5 --- /dev/null +++ b/2020/28xxx/CVE-2020-28141.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28141", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28142.json b/2020/28xxx/CVE-2020-28142.json new file mode 100644 index 00000000000..bdccb92908a --- /dev/null +++ b/2020/28xxx/CVE-2020-28142.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28142", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28143.json b/2020/28xxx/CVE-2020-28143.json new file mode 100644 index 00000000000..46f4b4375f8 --- /dev/null +++ b/2020/28xxx/CVE-2020-28143.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28143", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28144.json b/2020/28xxx/CVE-2020-28144.json new file mode 100644 index 00000000000..422ddb26f5f --- /dev/null +++ b/2020/28xxx/CVE-2020-28144.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28144", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28145.json b/2020/28xxx/CVE-2020-28145.json new file mode 100644 index 00000000000..98769d740a4 --- /dev/null +++ b/2020/28xxx/CVE-2020-28145.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28145", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28146.json b/2020/28xxx/CVE-2020-28146.json new file mode 100644 index 00000000000..fd779dbae2c --- /dev/null +++ b/2020/28xxx/CVE-2020-28146.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28146", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28147.json b/2020/28xxx/CVE-2020-28147.json new file mode 100644 index 00000000000..31bec4ddec3 --- /dev/null +++ b/2020/28xxx/CVE-2020-28147.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28147", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28148.json b/2020/28xxx/CVE-2020-28148.json new file mode 100644 index 00000000000..77a7075317d --- /dev/null +++ b/2020/28xxx/CVE-2020-28148.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28148", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28149.json b/2020/28xxx/CVE-2020-28149.json new file mode 100644 index 00000000000..1df896b263a --- /dev/null +++ b/2020/28xxx/CVE-2020-28149.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28149", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28150.json b/2020/28xxx/CVE-2020-28150.json new file mode 100644 index 00000000000..10f58684b29 --- /dev/null +++ b/2020/28xxx/CVE-2020-28150.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28150", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28151.json b/2020/28xxx/CVE-2020-28151.json new file mode 100644 index 00000000000..05b782abe0a --- /dev/null +++ b/2020/28xxx/CVE-2020-28151.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28151", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28152.json b/2020/28xxx/CVE-2020-28152.json new file mode 100644 index 00000000000..49b20306b1d --- /dev/null +++ b/2020/28xxx/CVE-2020-28152.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28152", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28153.json b/2020/28xxx/CVE-2020-28153.json new file mode 100644 index 00000000000..f4b16fa6a5f --- /dev/null +++ b/2020/28xxx/CVE-2020-28153.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28153", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28154.json b/2020/28xxx/CVE-2020-28154.json new file mode 100644 index 00000000000..36bb623cbc2 --- /dev/null +++ b/2020/28xxx/CVE-2020-28154.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28154", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28155.json b/2020/28xxx/CVE-2020-28155.json new file mode 100644 index 00000000000..46f131cae3f --- /dev/null +++ b/2020/28xxx/CVE-2020-28155.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28155", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28156.json b/2020/28xxx/CVE-2020-28156.json new file mode 100644 index 00000000000..ea5cb4c7814 --- /dev/null +++ b/2020/28xxx/CVE-2020-28156.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28156", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28157.json b/2020/28xxx/CVE-2020-28157.json new file mode 100644 index 00000000000..a2f3d7a8fb4 --- /dev/null +++ b/2020/28xxx/CVE-2020-28157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28158.json b/2020/28xxx/CVE-2020-28158.json new file mode 100644 index 00000000000..5d191c84549 --- /dev/null +++ b/2020/28xxx/CVE-2020-28158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28159.json b/2020/28xxx/CVE-2020-28159.json new file mode 100644 index 00000000000..6ceaa2abbc5 --- /dev/null +++ b/2020/28xxx/CVE-2020-28159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28160.json b/2020/28xxx/CVE-2020-28160.json new file mode 100644 index 00000000000..d9ccd6a572f --- /dev/null +++ b/2020/28xxx/CVE-2020-28160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28161.json b/2020/28xxx/CVE-2020-28161.json new file mode 100644 index 00000000000..bba6559e469 --- /dev/null +++ b/2020/28xxx/CVE-2020-28161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28162.json b/2020/28xxx/CVE-2020-28162.json new file mode 100644 index 00000000000..10c065449b6 --- /dev/null +++ b/2020/28xxx/CVE-2020-28162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28163.json b/2020/28xxx/CVE-2020-28163.json new file mode 100644 index 00000000000..615b9849904 --- /dev/null +++ b/2020/28xxx/CVE-2020-28163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28164.json b/2020/28xxx/CVE-2020-28164.json new file mode 100644 index 00000000000..7444eb32e0d --- /dev/null +++ b/2020/28xxx/CVE-2020-28164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28165.json b/2020/28xxx/CVE-2020-28165.json new file mode 100644 index 00000000000..9e9a6572f23 --- /dev/null +++ b/2020/28xxx/CVE-2020-28165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28166.json b/2020/28xxx/CVE-2020-28166.json new file mode 100644 index 00000000000..d721c36d322 --- /dev/null +++ b/2020/28xxx/CVE-2020-28166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28167.json b/2020/28xxx/CVE-2020-28167.json new file mode 100644 index 00000000000..3aaead9d0d8 --- /dev/null +++ b/2020/28xxx/CVE-2020-28167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28168.json b/2020/28xxx/CVE-2020-28168.json new file mode 100644 index 00000000000..05765dd3a3e --- /dev/null +++ b/2020/28xxx/CVE-2020-28168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28169.json b/2020/28xxx/CVE-2020-28169.json new file mode 100644 index 00000000000..4b82e10c15f --- /dev/null +++ b/2020/28xxx/CVE-2020-28169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28170.json b/2020/28xxx/CVE-2020-28170.json new file mode 100644 index 00000000000..0a60791aa4d --- /dev/null +++ b/2020/28xxx/CVE-2020-28170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28171.json b/2020/28xxx/CVE-2020-28171.json new file mode 100644 index 00000000000..7bf2c6cd4da --- /dev/null +++ b/2020/28xxx/CVE-2020-28171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28172.json b/2020/28xxx/CVE-2020-28172.json new file mode 100644 index 00000000000..5f1d6da4f25 --- /dev/null +++ b/2020/28xxx/CVE-2020-28172.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28172", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28173.json b/2020/28xxx/CVE-2020-28173.json new file mode 100644 index 00000000000..e36f8625c32 --- /dev/null +++ b/2020/28xxx/CVE-2020-28173.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28173", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28174.json b/2020/28xxx/CVE-2020-28174.json new file mode 100644 index 00000000000..1214cccd88e --- /dev/null +++ b/2020/28xxx/CVE-2020-28174.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28174", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28175.json b/2020/28xxx/CVE-2020-28175.json new file mode 100644 index 00000000000..f168fada670 --- /dev/null +++ b/2020/28xxx/CVE-2020-28175.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28175", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28176.json b/2020/28xxx/CVE-2020-28176.json new file mode 100644 index 00000000000..91b57528522 --- /dev/null +++ b/2020/28xxx/CVE-2020-28176.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28176", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28177.json b/2020/28xxx/CVE-2020-28177.json new file mode 100644 index 00000000000..6efe6e5edaa --- /dev/null +++ b/2020/28xxx/CVE-2020-28177.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28177", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28178.json b/2020/28xxx/CVE-2020-28178.json new file mode 100644 index 00000000000..0586f1f65b1 --- /dev/null +++ b/2020/28xxx/CVE-2020-28178.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28178", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28179.json b/2020/28xxx/CVE-2020-28179.json new file mode 100644 index 00000000000..9e2520b2309 --- /dev/null +++ b/2020/28xxx/CVE-2020-28179.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28179", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28180.json b/2020/28xxx/CVE-2020-28180.json new file mode 100644 index 00000000000..8ddf79317ac --- /dev/null +++ b/2020/28xxx/CVE-2020-28180.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28180", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28181.json b/2020/28xxx/CVE-2020-28181.json new file mode 100644 index 00000000000..ce184167b63 --- /dev/null +++ b/2020/28xxx/CVE-2020-28181.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28181", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28182.json b/2020/28xxx/CVE-2020-28182.json new file mode 100644 index 00000000000..1507e0892dc --- /dev/null +++ b/2020/28xxx/CVE-2020-28182.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28182", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28183.json b/2020/28xxx/CVE-2020-28183.json new file mode 100644 index 00000000000..4159c6a5dbb --- /dev/null +++ b/2020/28xxx/CVE-2020-28183.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28183", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28184.json b/2020/28xxx/CVE-2020-28184.json new file mode 100644 index 00000000000..69262a43812 --- /dev/null +++ b/2020/28xxx/CVE-2020-28184.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28184", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28185.json b/2020/28xxx/CVE-2020-28185.json new file mode 100644 index 00000000000..2ca95dd1045 --- /dev/null +++ b/2020/28xxx/CVE-2020-28185.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28185", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28186.json b/2020/28xxx/CVE-2020-28186.json new file mode 100644 index 00000000000..1fe031e4e40 --- /dev/null +++ b/2020/28xxx/CVE-2020-28186.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28186", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28187.json b/2020/28xxx/CVE-2020-28187.json new file mode 100644 index 00000000000..7835d5e13e9 --- /dev/null +++ b/2020/28xxx/CVE-2020-28187.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28187", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28188.json b/2020/28xxx/CVE-2020-28188.json new file mode 100644 index 00000000000..f7bdf5593fd --- /dev/null +++ b/2020/28xxx/CVE-2020-28188.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28188", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28189.json b/2020/28xxx/CVE-2020-28189.json new file mode 100644 index 00000000000..adaf5f0ffb1 --- /dev/null +++ b/2020/28xxx/CVE-2020-28189.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28189", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28190.json b/2020/28xxx/CVE-2020-28190.json new file mode 100644 index 00000000000..acb4e540e39 --- /dev/null +++ b/2020/28xxx/CVE-2020-28190.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28190", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28191.json b/2020/28xxx/CVE-2020-28191.json new file mode 100644 index 00000000000..5e50b0dd638 --- /dev/null +++ b/2020/28xxx/CVE-2020-28191.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28191", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28192.json b/2020/28xxx/CVE-2020-28192.json new file mode 100644 index 00000000000..364f8c96733 --- /dev/null +++ b/2020/28xxx/CVE-2020-28192.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28192", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28193.json b/2020/28xxx/CVE-2020-28193.json new file mode 100644 index 00000000000..fbcea35a8f6 --- /dev/null +++ b/2020/28xxx/CVE-2020-28193.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28193", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28194.json b/2020/28xxx/CVE-2020-28194.json new file mode 100644 index 00000000000..1ee9173b8f6 --- /dev/null +++ b/2020/28xxx/CVE-2020-28194.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28194", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file