From 0971b2b58cc3da920f555e60a9bd81e3ce8280b3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 15 Jan 2020 15:01:05 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2015/1xxx/CVE-2015-1850.json | 14 ++++---- 2015/7xxx/CVE-2015-7556.json | 55 +++++++++++++++++++++++++++-- 2015/8xxx/CVE-2015-8549.json | 63 ++++++++++++++++++++++++++++++++-- 2019/11xxx/CVE-2019-11281.json | 5 +++ 2020/7xxx/CVE-2020-7053.json | 5 +++ 2020/7xxx/CVE-2020-7059.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7060.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7061.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7062.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7063.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7064.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7065.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7066.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7067.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7068.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7069.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7070.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7071.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7072.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7073.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7074.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7075.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7076.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7077.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7078.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7079.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7080.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7081.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7082.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7083.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7084.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7085.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7086.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7087.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7088.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7089.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7090.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7091.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7092.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7093.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7094.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7095.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7096.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7097.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7098.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7099.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7100.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7101.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7102.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7103.json | 18 ++++++++++ 50 files changed, 940 insertions(+), 12 deletions(-) create mode 100644 2020/7xxx/CVE-2020-7059.json create mode 100644 2020/7xxx/CVE-2020-7060.json create mode 100644 2020/7xxx/CVE-2020-7061.json create mode 100644 2020/7xxx/CVE-2020-7062.json create mode 100644 2020/7xxx/CVE-2020-7063.json create mode 100644 2020/7xxx/CVE-2020-7064.json create mode 100644 2020/7xxx/CVE-2020-7065.json create mode 100644 2020/7xxx/CVE-2020-7066.json create mode 100644 2020/7xxx/CVE-2020-7067.json create mode 100644 2020/7xxx/CVE-2020-7068.json create mode 100644 2020/7xxx/CVE-2020-7069.json create mode 100644 2020/7xxx/CVE-2020-7070.json create mode 100644 2020/7xxx/CVE-2020-7071.json create mode 100644 2020/7xxx/CVE-2020-7072.json create mode 100644 2020/7xxx/CVE-2020-7073.json create mode 100644 2020/7xxx/CVE-2020-7074.json create mode 100644 2020/7xxx/CVE-2020-7075.json create mode 100644 2020/7xxx/CVE-2020-7076.json create mode 100644 2020/7xxx/CVE-2020-7077.json create mode 100644 2020/7xxx/CVE-2020-7078.json create mode 100644 2020/7xxx/CVE-2020-7079.json create mode 100644 2020/7xxx/CVE-2020-7080.json create mode 100644 2020/7xxx/CVE-2020-7081.json create mode 100644 2020/7xxx/CVE-2020-7082.json create mode 100644 2020/7xxx/CVE-2020-7083.json create mode 100644 2020/7xxx/CVE-2020-7084.json create mode 100644 2020/7xxx/CVE-2020-7085.json create mode 100644 2020/7xxx/CVE-2020-7086.json create mode 100644 2020/7xxx/CVE-2020-7087.json create mode 100644 2020/7xxx/CVE-2020-7088.json create mode 100644 2020/7xxx/CVE-2020-7089.json create mode 100644 2020/7xxx/CVE-2020-7090.json create mode 100644 2020/7xxx/CVE-2020-7091.json create mode 100644 2020/7xxx/CVE-2020-7092.json create mode 100644 2020/7xxx/CVE-2020-7093.json create mode 100644 2020/7xxx/CVE-2020-7094.json create mode 100644 2020/7xxx/CVE-2020-7095.json create mode 100644 2020/7xxx/CVE-2020-7096.json create mode 100644 2020/7xxx/CVE-2020-7097.json create mode 100644 2020/7xxx/CVE-2020-7098.json create mode 100644 2020/7xxx/CVE-2020-7099.json create mode 100644 2020/7xxx/CVE-2020-7100.json create mode 100644 2020/7xxx/CVE-2020-7101.json create mode 100644 2020/7xxx/CVE-2020-7102.json create mode 100644 2020/7xxx/CVE-2020-7103.json diff --git a/2015/1xxx/CVE-2015-1850.json b/2015/1xxx/CVE-2015-1850.json index a4fca09dbd0..66130bcde9b 100644 --- a/2015/1xxx/CVE-2015-1850.json +++ b/2015/1xxx/CVE-2015-1850.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2015-1850", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2015-1850", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not an exploitable issue. Notes: none." } ] } diff --git a/2015/7xxx/CVE-2015-7556.json b/2015/7xxx/CVE-2015-7556.json index 05738853ce1..98b9483c265 100644 --- a/2015/7xxx/CVE-2015-7556.json +++ b/2015/7xxx/CVE-2015-7556.json @@ -1,8 +1,8 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7556", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,56 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DeleGate 9.9.13 allows local users to gain privileges as demonstrated by the dgcpnod setuid program." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Other" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "National Institute of Advanced Industrial Science and Technology", + "product": { + "product_data": [ + { + "product_name": "DeleGate", + "version": { + "version_data": [ + { + "version_value": "9.9.13" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.vapidlabs.com/advisory.php?v=159", + "url": "http://www.vapidlabs.com/advisory.php?v=159" + }, + { + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2015/Dec/123", + "url": "http://seclists.org/fulldisclosure/2015/Dec/123" } ] } diff --git a/2015/8xxx/CVE-2015-8549.json b/2015/8xxx/CVE-2015-8549.json index 039102b93d2..073728b91c5 100644 --- a/2015/8xxx/CVE-2015-8549.json +++ b/2015/8xxx/CVE-2015-8549.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8549", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,66 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "XML external entity (XXE) vulnerability in PyAMF before 0.8.0 allows remote attackers to cause a denial of service or read arbitrary files via a crafted Action Message Format (AMF) payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.ocert.org/advisories/ocert-2015-011.html", + "url": "http://www.ocert.org/advisories/ocert-2015-011.html" + }, + { + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/archive/1/537151/100/0/threaded", + "url": "http://www.securityfocus.com/archive/1/archive/1/537151/100/0/threaded" + }, + { + "refsource": "MISC", + "name": "https://github.com/hydralabs/pyamf/pull/58", + "url": "https://github.com/hydralabs/pyamf/pull/58" + }, + { + "refsource": "MISC", + "name": "https://github.com/hydralabs/pyamf/releases/tag/v0.8.0", + "url": "https://github.com/hydralabs/pyamf/releases/tag/v0.8.0" } ] } diff --git a/2019/11xxx/CVE-2019-11281.json b/2019/11xxx/CVE-2019-11281.json index 9a4c5b92be4..ce2a77276b9 100644 --- a/2019/11xxx/CVE-2019-11281.json +++ b/2019/11xxx/CVE-2019-11281.json @@ -87,6 +87,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-74d2feb5be", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0078", + "url": "https://access.redhat.com/errata/RHSA-2020:0078" } ] }, diff --git a/2020/7xxx/CVE-2020-7053.json b/2020/7xxx/CVE-2020-7053.json index 46080b0c092..7803e706c67 100644 --- a/2020/7xxx/CVE-2020-7053.json +++ b/2020/7xxx/CVE-2020-7053.json @@ -66,6 +66,11 @@ "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7dc40713618c884bf07c030d1ab1f47a9dc1f310", "refsource": "MISC", "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7dc40713618c884bf07c030d1ab1f47a9dc1f310" + }, + { + "refsource": "CONFIRM", + "name": "https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522", + "url": "https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522" } ] } diff --git a/2020/7xxx/CVE-2020-7059.json b/2020/7xxx/CVE-2020-7059.json new file mode 100644 index 00000000000..d69faee854d --- /dev/null +++ b/2020/7xxx/CVE-2020-7059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7060.json b/2020/7xxx/CVE-2020-7060.json new file mode 100644 index 00000000000..d4a162e2587 --- /dev/null +++ b/2020/7xxx/CVE-2020-7060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7061.json b/2020/7xxx/CVE-2020-7061.json new file mode 100644 index 00000000000..defe4b05d58 --- /dev/null +++ b/2020/7xxx/CVE-2020-7061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7062.json b/2020/7xxx/CVE-2020-7062.json new file mode 100644 index 00000000000..0b2c29e0e4d --- /dev/null +++ b/2020/7xxx/CVE-2020-7062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7063.json b/2020/7xxx/CVE-2020-7063.json new file mode 100644 index 00000000000..1ffaa480240 --- /dev/null +++ b/2020/7xxx/CVE-2020-7063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7064.json b/2020/7xxx/CVE-2020-7064.json new file mode 100644 index 00000000000..5c3d8c3e0b5 --- /dev/null +++ b/2020/7xxx/CVE-2020-7064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7065.json b/2020/7xxx/CVE-2020-7065.json new file mode 100644 index 00000000000..10c88d8a84c --- /dev/null +++ b/2020/7xxx/CVE-2020-7065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7066.json b/2020/7xxx/CVE-2020-7066.json new file mode 100644 index 00000000000..6a5b31dda5a --- /dev/null +++ b/2020/7xxx/CVE-2020-7066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7067.json b/2020/7xxx/CVE-2020-7067.json new file mode 100644 index 00000000000..c4884bbc437 --- /dev/null +++ b/2020/7xxx/CVE-2020-7067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7068.json b/2020/7xxx/CVE-2020-7068.json new file mode 100644 index 00000000000..4ea09887121 --- /dev/null +++ b/2020/7xxx/CVE-2020-7068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7069.json b/2020/7xxx/CVE-2020-7069.json new file mode 100644 index 00000000000..fc60e4259b3 --- /dev/null +++ b/2020/7xxx/CVE-2020-7069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7070.json b/2020/7xxx/CVE-2020-7070.json new file mode 100644 index 00000000000..c1f97d11d8b --- /dev/null +++ b/2020/7xxx/CVE-2020-7070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7071.json b/2020/7xxx/CVE-2020-7071.json new file mode 100644 index 00000000000..e584ee1bd52 --- /dev/null +++ b/2020/7xxx/CVE-2020-7071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7072.json b/2020/7xxx/CVE-2020-7072.json new file mode 100644 index 00000000000..99f989602e1 --- /dev/null +++ b/2020/7xxx/CVE-2020-7072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7073.json b/2020/7xxx/CVE-2020-7073.json new file mode 100644 index 00000000000..d1dc5d96bd4 --- /dev/null +++ b/2020/7xxx/CVE-2020-7073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7074.json b/2020/7xxx/CVE-2020-7074.json new file mode 100644 index 00000000000..e4b29e9d4fe --- /dev/null +++ b/2020/7xxx/CVE-2020-7074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7075.json b/2020/7xxx/CVE-2020-7075.json new file mode 100644 index 00000000000..9ecb576e0e9 --- /dev/null +++ b/2020/7xxx/CVE-2020-7075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7076.json b/2020/7xxx/CVE-2020-7076.json new file mode 100644 index 00000000000..cf446bde3a5 --- /dev/null +++ b/2020/7xxx/CVE-2020-7076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7077.json b/2020/7xxx/CVE-2020-7077.json new file mode 100644 index 00000000000..bc538ee73d6 --- /dev/null +++ b/2020/7xxx/CVE-2020-7077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7078.json b/2020/7xxx/CVE-2020-7078.json new file mode 100644 index 00000000000..6abf2387022 --- /dev/null +++ b/2020/7xxx/CVE-2020-7078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7079.json b/2020/7xxx/CVE-2020-7079.json new file mode 100644 index 00000000000..dcbea65f30b --- /dev/null +++ b/2020/7xxx/CVE-2020-7079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7080.json b/2020/7xxx/CVE-2020-7080.json new file mode 100644 index 00000000000..4bbc9323729 --- /dev/null +++ b/2020/7xxx/CVE-2020-7080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7081.json b/2020/7xxx/CVE-2020-7081.json new file mode 100644 index 00000000000..af7a871c596 --- /dev/null +++ b/2020/7xxx/CVE-2020-7081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7082.json b/2020/7xxx/CVE-2020-7082.json new file mode 100644 index 00000000000..d7260b69fb5 --- /dev/null +++ b/2020/7xxx/CVE-2020-7082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7083.json b/2020/7xxx/CVE-2020-7083.json new file mode 100644 index 00000000000..32686fe247a --- /dev/null +++ b/2020/7xxx/CVE-2020-7083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7084.json b/2020/7xxx/CVE-2020-7084.json new file mode 100644 index 00000000000..bccf9a467c2 --- /dev/null +++ b/2020/7xxx/CVE-2020-7084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7085.json b/2020/7xxx/CVE-2020-7085.json new file mode 100644 index 00000000000..0fff041adc4 --- /dev/null +++ b/2020/7xxx/CVE-2020-7085.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7085", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7086.json b/2020/7xxx/CVE-2020-7086.json new file mode 100644 index 00000000000..174ba247c24 --- /dev/null +++ b/2020/7xxx/CVE-2020-7086.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7086", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7087.json b/2020/7xxx/CVE-2020-7087.json new file mode 100644 index 00000000000..53db4474591 --- /dev/null +++ b/2020/7xxx/CVE-2020-7087.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7087", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7088.json b/2020/7xxx/CVE-2020-7088.json new file mode 100644 index 00000000000..5401ad850b9 --- /dev/null +++ b/2020/7xxx/CVE-2020-7088.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7088", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7089.json b/2020/7xxx/CVE-2020-7089.json new file mode 100644 index 00000000000..80231727dd3 --- /dev/null +++ b/2020/7xxx/CVE-2020-7089.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7089", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7090.json b/2020/7xxx/CVE-2020-7090.json new file mode 100644 index 00000000000..07ace67932f --- /dev/null +++ b/2020/7xxx/CVE-2020-7090.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7090", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7091.json b/2020/7xxx/CVE-2020-7091.json new file mode 100644 index 00000000000..5ab21a6b222 --- /dev/null +++ b/2020/7xxx/CVE-2020-7091.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7091", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7092.json b/2020/7xxx/CVE-2020-7092.json new file mode 100644 index 00000000000..034c95deee5 --- /dev/null +++ b/2020/7xxx/CVE-2020-7092.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7092", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7093.json b/2020/7xxx/CVE-2020-7093.json new file mode 100644 index 00000000000..fafb979aaa4 --- /dev/null +++ b/2020/7xxx/CVE-2020-7093.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7093", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7094.json b/2020/7xxx/CVE-2020-7094.json new file mode 100644 index 00000000000..6e5314b7e91 --- /dev/null +++ b/2020/7xxx/CVE-2020-7094.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7094", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7095.json b/2020/7xxx/CVE-2020-7095.json new file mode 100644 index 00000000000..eb87a89aa8c --- /dev/null +++ b/2020/7xxx/CVE-2020-7095.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7095", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7096.json b/2020/7xxx/CVE-2020-7096.json new file mode 100644 index 00000000000..b02c1ed5a42 --- /dev/null +++ b/2020/7xxx/CVE-2020-7096.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7096", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7097.json b/2020/7xxx/CVE-2020-7097.json new file mode 100644 index 00000000000..ca75d0af2e1 --- /dev/null +++ b/2020/7xxx/CVE-2020-7097.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7097", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7098.json b/2020/7xxx/CVE-2020-7098.json new file mode 100644 index 00000000000..e93580d2a04 --- /dev/null +++ b/2020/7xxx/CVE-2020-7098.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7098", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7099.json b/2020/7xxx/CVE-2020-7099.json new file mode 100644 index 00000000000..027956f04a7 --- /dev/null +++ b/2020/7xxx/CVE-2020-7099.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7099", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7100.json b/2020/7xxx/CVE-2020-7100.json new file mode 100644 index 00000000000..5fc13a1ea27 --- /dev/null +++ b/2020/7xxx/CVE-2020-7100.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7100", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7101.json b/2020/7xxx/CVE-2020-7101.json new file mode 100644 index 00000000000..b50d723b7f7 --- /dev/null +++ b/2020/7xxx/CVE-2020-7101.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7101", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7102.json b/2020/7xxx/CVE-2020-7102.json new file mode 100644 index 00000000000..c1ad57a2bbc --- /dev/null +++ b/2020/7xxx/CVE-2020-7102.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7102", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7103.json b/2020/7xxx/CVE-2020-7103.json new file mode 100644 index 00000000000..806d0eb455e --- /dev/null +++ b/2020/7xxx/CVE-2020-7103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file