diff --git a/2019/1003xxx/CVE-2019-1003030.json b/2019/1003xxx/CVE-2019-1003030.json index 5f72c5452f6..718b107a00b 100644 --- a/2019/1003xxx/CVE-2019-1003030.json +++ b/2019/1003xxx/CVE-2019-1003030.json @@ -68,6 +68,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:0739", "url": "https://access.redhat.com/errata/RHSA-2019:0739" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html", + "url": "http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html" } ] } diff --git a/2020/16xxx/CVE-2020-16952.json b/2020/16xxx/CVE-2020-16952.json index fb4e085c297..b5d3cae5709 100644 --- a/2020/16xxx/CVE-2020-16952.json +++ b/2020/16xxx/CVE-2020-16952.json @@ -76,6 +76,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159612/Microsoft-SharePoint-SSI-ViewState-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/159612/Microsoft-SharePoint-SSI-ViewState-Remote-Code-Execution.html" } ] } diff --git a/2020/24xxx/CVE-2020-24214.json b/2020/24xxx/CVE-2020-24214.json index 4a5612dadb9..65a1c3be51f 100644 --- a/2020/24xxx/CVE-2020-24214.json +++ b/2020/24xxx/CVE-2020-24214.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/", "url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html", + "url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html" } ] } diff --git a/2020/24xxx/CVE-2020-24215.json b/2020/24xxx/CVE-2020-24215.json index 27a3c8278f2..1a249619e33 100644 --- a/2020/24xxx/CVE-2020-24215.json +++ b/2020/24xxx/CVE-2020-24215.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/", "url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html", + "url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html" } ] } diff --git a/2020/24xxx/CVE-2020-24217.json b/2020/24xxx/CVE-2020-24217.json index e10d3b397be..c0882cac4fc 100644 --- a/2020/24xxx/CVE-2020-24217.json +++ b/2020/24xxx/CVE-2020-24217.json @@ -61,6 +61,16 @@ "refsource": "MISC", "name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/", "url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html", + "url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html" } ] } diff --git a/2020/24xxx/CVE-2020-24219.json b/2020/24xxx/CVE-2020-24219.json index 907aa1559b2..83ea5086656 100644 --- a/2020/24xxx/CVE-2020-24219.json +++ b/2020/24xxx/CVE-2020-24219.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/", "url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html", + "url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html" } ] } diff --git a/2020/24xxx/CVE-2020-24629.json b/2020/24xxx/CVE-2020-24629.json index a432582a929..652daedf3e3 100644 --- a/2020/24xxx/CVE-2020-24629.json +++ b/2020/24xxx/CVE-2020-24629.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-24629", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HPE Intelligent Management Center (iMC)", + "version": { + "version_data": [ + { + "version_value": "Prior to iMC PLAT 7.3 (E0705P07)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote urlaccesscontroller authentication bypass vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote urlaccesscontroller authentication bypass vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07)." } ] } diff --git a/2020/24xxx/CVE-2020-24630.json b/2020/24xxx/CVE-2020-24630.json index c42a0a4be9d..a92412a5b8a 100644 --- a/2020/24xxx/CVE-2020-24630.json +++ b/2020/24xxx/CVE-2020-24630.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-24630", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HPE Intelligent Management Center (iMC)", + "version": { + "version_data": [ + { + "version_value": "Prior to iMC PLAT 7.3 (E0705P07)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote operatoronlinelist_content privilege escalation vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote operatoronlinelist_content privilege escalation vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07)." } ] } diff --git a/2020/24xxx/CVE-2020-24646.json b/2020/24xxx/CVE-2020-24646.json index c7a7a750f27..3815b2559f8 100644 --- a/2020/24xxx/CVE-2020-24646.json +++ b/2020/24xxx/CVE-2020-24646.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-24646", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HPE Intelligent Management Center (iMC)", + "version": { + "version_data": [ + { + "version_value": "Prior to iMC PLAT 7.3 (E0705P07)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "tftpserver stack-based buffer overflow remote code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A tftpserver stack-based buffer overflow remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07)." } ] } diff --git a/2020/24xxx/CVE-2020-24647.json b/2020/24xxx/CVE-2020-24647.json index 4b9ddff29a0..6ef0dddd2d1 100644 --- a/2020/24xxx/CVE-2020-24647.json +++ b/2020/24xxx/CVE-2020-24647.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-24647", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HPE Intelligent Management Center (iMC)", + "version": { + "version_data": [ + { + "version_value": "Prior to iMC PLAT 7.3 (E0705P07)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote accessmgrservlet classname input validation code execution vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote accessmgrservlet classname input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07)." } ] } diff --git a/2020/27xxx/CVE-2020-27301.json b/2020/27xxx/CVE-2020-27301.json new file mode 100644 index 00000000000..e7d421c5fe9 --- /dev/null +++ b/2020/27xxx/CVE-2020-27301.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27301", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27302.json b/2020/27xxx/CVE-2020-27302.json new file mode 100644 index 00000000000..8e00d55836f --- /dev/null +++ b/2020/27xxx/CVE-2020-27302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27303.json b/2020/27xxx/CVE-2020-27303.json new file mode 100644 index 00000000000..f0613804d0d --- /dev/null +++ b/2020/27xxx/CVE-2020-27303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27304.json b/2020/27xxx/CVE-2020-27304.json new file mode 100644 index 00000000000..040b04f3518 --- /dev/null +++ b/2020/27xxx/CVE-2020-27304.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27304", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27305.json b/2020/27xxx/CVE-2020-27305.json new file mode 100644 index 00000000000..771c4ee7c80 --- /dev/null +++ b/2020/27xxx/CVE-2020-27305.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27305", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27306.json b/2020/27xxx/CVE-2020-27306.json new file mode 100644 index 00000000000..9c8fe5338a9 --- /dev/null +++ b/2020/27xxx/CVE-2020-27306.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27306", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27307.json b/2020/27xxx/CVE-2020-27307.json new file mode 100644 index 00000000000..2ce8af96f71 --- /dev/null +++ b/2020/27xxx/CVE-2020-27307.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27307", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27308.json b/2020/27xxx/CVE-2020-27308.json new file mode 100644 index 00000000000..c38345b3fd3 --- /dev/null +++ b/2020/27xxx/CVE-2020-27308.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27308", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27309.json b/2020/27xxx/CVE-2020-27309.json new file mode 100644 index 00000000000..6cde86f997a --- /dev/null +++ b/2020/27xxx/CVE-2020-27309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27310.json b/2020/27xxx/CVE-2020-27310.json new file mode 100644 index 00000000000..b65d5d97193 --- /dev/null +++ b/2020/27xxx/CVE-2020-27310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27311.json b/2020/27xxx/CVE-2020-27311.json new file mode 100644 index 00000000000..5a9c0ef7df5 --- /dev/null +++ b/2020/27xxx/CVE-2020-27311.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27311", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27312.json b/2020/27xxx/CVE-2020-27312.json new file mode 100644 index 00000000000..333a563b75d --- /dev/null +++ b/2020/27xxx/CVE-2020-27312.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27312", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27313.json b/2020/27xxx/CVE-2020-27313.json new file mode 100644 index 00000000000..8c87a889c20 --- /dev/null +++ b/2020/27xxx/CVE-2020-27313.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27313", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27314.json b/2020/27xxx/CVE-2020-27314.json new file mode 100644 index 00000000000..6cc9abfec75 --- /dev/null +++ b/2020/27xxx/CVE-2020-27314.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27314", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27315.json b/2020/27xxx/CVE-2020-27315.json new file mode 100644 index 00000000000..185ae6549d5 --- /dev/null +++ b/2020/27xxx/CVE-2020-27315.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27315", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27316.json b/2020/27xxx/CVE-2020-27316.json new file mode 100644 index 00000000000..e4596a7abb8 --- /dev/null +++ b/2020/27xxx/CVE-2020-27316.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27316", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27317.json b/2020/27xxx/CVE-2020-27317.json new file mode 100644 index 00000000000..33af1de0f3f --- /dev/null +++ b/2020/27xxx/CVE-2020-27317.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27317", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27318.json b/2020/27xxx/CVE-2020-27318.json new file mode 100644 index 00000000000..f1862658912 --- /dev/null +++ b/2020/27xxx/CVE-2020-27318.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27318", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27319.json b/2020/27xxx/CVE-2020-27319.json new file mode 100644 index 00000000000..43e94fe5c4f --- /dev/null +++ b/2020/27xxx/CVE-2020-27319.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27319", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4280.json b/2020/4xxx/CVE-2020-4280.json index 990ab641da2..7f4e33dde66 100644 --- a/2020/4xxx/CVE-2020-4280.json +++ b/2020/4xxx/CVE-2020-4280.json @@ -92,6 +92,11 @@ "refsource": "FULLDISC", "name": "20201016 Java deserialization vulnerability in QRadar RemoteJavaScript Servlet", "url": "http://seclists.org/fulldisclosure/2020/Oct/18" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159589/QRadar-RemoteJavaScript-Deserialization.html", + "url": "http://packetstormsecurity.com/files/159589/QRadar-RemoteJavaScript-Deserialization.html" } ] }, diff --git a/2020/6xxx/CVE-2020-6541.json b/2020/6xxx/CVE-2020-6541.json index f5d3173f18b..6f1458278f7 100644 --- a/2020/6xxx/CVE-2020-6541.json +++ b/2020/6xxx/CVE-2020-6541.json @@ -59,6 +59,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-6da740d38c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159610/Chrome-USB-OnServiceConnectionError-Use-After-Free.html", + "url": "http://packetstormsecurity.com/files/159610/Chrome-USB-OnServiceConnectionError-Use-After-Free.html" } ] }, diff --git a/2020/6xxx/CVE-2020-6550.json b/2020/6xxx/CVE-2020-6550.json index fd799d0b41f..9eec0311353 100644 --- a/2020/6xxx/CVE-2020-6550.json +++ b/2020/6xxx/CVE-2020-6550.json @@ -59,6 +59,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-6da740d38c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html", + "url": "http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html" } ] }, diff --git a/2020/6xxx/CVE-2020-6551.json b/2020/6xxx/CVE-2020-6551.json index 9025dfb11f3..82ddf116539 100644 --- a/2020/6xxx/CVE-2020-6551.json +++ b/2020/6xxx/CVE-2020-6551.json @@ -59,6 +59,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-6da740d38c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html", + "url": "http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html" } ] },