diff --git a/2016/9xxx/CVE-2016-9840.json b/2016/9xxx/CVE-2016-9840.json index 17755a431e7..fd4d105b10c 100644 --- a/2016/9xxx/CVE-2016-9840.json +++ b/2016/9xxx/CVE-2016-9840.json @@ -196,6 +196,11 @@ "name": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", "refsource": "MISC", "url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-54", + "url": "https://security.gentoo.org/glsa/202007-54" } ] } diff --git a/2016/9xxx/CVE-2016-9841.json b/2016/9xxx/CVE-2016-9841.json index fb4ccf5d97f..e6a58b87fa2 100644 --- a/2016/9xxx/CVE-2016-9841.json +++ b/2016/9xxx/CVE-2016-9841.json @@ -211,6 +211,11 @@ "name": "https://security.netapp.com/advisory/ntap-20171019-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171019-0001/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-54", + "url": "https://security.gentoo.org/glsa/202007-54" } ] } diff --git a/2016/9xxx/CVE-2016-9842.json b/2016/9xxx/CVE-2016-9842.json index 1f0a269dc03..b9fef023543 100644 --- a/2016/9xxx/CVE-2016-9842.json +++ b/2016/9xxx/CVE-2016-9842.json @@ -196,6 +196,11 @@ "name": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958", "refsource": "CONFIRM", "url": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-54", + "url": "https://security.gentoo.org/glsa/202007-54" } ] } diff --git a/2016/9xxx/CVE-2016-9843.json b/2016/9xxx/CVE-2016-9843.json index e11d319f39e..2cb067faa20 100644 --- a/2016/9xxx/CVE-2016-9843.json +++ b/2016/9xxx/CVE-2016-9843.json @@ -211,6 +211,11 @@ "name": "https://security.netapp.com/advisory/ntap-20181018-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181018-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-54", + "url": "https://security.gentoo.org/glsa/202007-54" } ] } diff --git a/2018/0xxx/CVE-2018-0739.json b/2018/0xxx/CVE-2018-0739.json index 2bf9745f014..0aa583db24f 100644 --- a/2018/0xxx/CVE-2018-0739.json +++ b/2018/0xxx/CVE-2018-0739.json @@ -229,6 +229,11 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-53", + "url": "https://security.gentoo.org/glsa/202007-53" } ] } diff --git a/2018/12xxx/CVE-2018-12437.json b/2018/12xxx/CVE-2018-12437.json index 30e149446cf..dfcd3390ad2 100644 --- a/2018/12xxx/CVE-2018-12437.json +++ b/2018/12xxx/CVE-2018-12437.json @@ -56,6 +56,11 @@ "name": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", "refsource": "MISC", "url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-53", + "url": "https://security.gentoo.org/glsa/202007-53" } ] } diff --git a/2018/20xxx/CVE-2018-20685.json b/2018/20xxx/CVE-2018-20685.json index da5c193909a..f18fba01519 100644 --- a/2018/20xxx/CVE-2018-20685.json +++ b/2018/20xxx/CVE-2018-20685.json @@ -111,6 +111,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:3702", "url": "https://access.redhat.com/errata/RHSA-2019:3702" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-53", + "url": "https://security.gentoo.org/glsa/202007-53" } ] } diff --git a/2019/11xxx/CVE-2019-11411.json b/2019/11xxx/CVE-2019-11411.json index 4aba8d4c583..3324609b5bf 100644 --- a/2019/11xxx/CVE-2019-11411.json +++ b/2019/11xxx/CVE-2019-11411.json @@ -71,6 +71,11 @@ "refsource": "BID", "name": "108093", "url": "http://www.securityfocus.com/bid/108093" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-52", + "url": "https://security.gentoo.org/glsa/202007-52" } ] } diff --git a/2019/11xxx/CVE-2019-11412.json b/2019/11xxx/CVE-2019-11412.json index 56189b92ee6..39d35b55525 100644 --- a/2019/11xxx/CVE-2019-11412.json +++ b/2019/11xxx/CVE-2019-11412.json @@ -71,6 +71,11 @@ "refsource": "BID", "name": "108093", "url": "http://www.securityfocus.com/bid/108093" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-52", + "url": "https://security.gentoo.org/glsa/202007-52" } ] } diff --git a/2019/11xxx/CVE-2019-11413.json b/2019/11xxx/CVE-2019-11413.json index a509a25ab59..a9782268336 100644 --- a/2019/11xxx/CVE-2019-11413.json +++ b/2019/11xxx/CVE-2019-11413.json @@ -71,6 +71,11 @@ "refsource": "BID", "name": "108093", "url": "http://www.securityfocus.com/bid/108093" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-52", + "url": "https://security.gentoo.org/glsa/202007-52" } ] } diff --git a/2020/10xxx/CVE-2020-10982.json b/2020/10xxx/CVE-2020-10982.json index b0570f1fd52..5acb49ee8b6 100644 --- a/2020/10xxx/CVE-2020-10982.json +++ b/2020/10xxx/CVE-2020-10982.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10982", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10982", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Gambio GX before 4.0.1.0 allows SQL Injection in admin/gv_mail.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2020-0033/", + "url": "https://herolab.usd.de/security-advisories/usd-2020-0033/" } ] } diff --git a/2020/10xxx/CVE-2020-10983.json b/2020/10xxx/CVE-2020-10983.json index 8de45fac9ee..9539d59f4f3 100644 --- a/2020/10xxx/CVE-2020-10983.json +++ b/2020/10xxx/CVE-2020-10983.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10983", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10983", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Gambio GX before 4.0.1.0 allows SQL Injection in admin/mobile.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2020-0034/", + "url": "https://herolab.usd.de/security-advisories/usd-2020-0034/" } ] } diff --git a/2020/10xxx/CVE-2020-10984.json b/2020/10xxx/CVE-2020-10984.json index d4ba3f1e425..34183337a6c 100644 --- a/2020/10xxx/CVE-2020-10984.json +++ b/2020/10xxx/CVE-2020-10984.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10984", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10984", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Gambio GX before 4.0.1.0 allows admin/admin.php CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2020-0031/", + "url": "https://herolab.usd.de/security-advisories/usd-2020-0031/" } ] } diff --git a/2020/10xxx/CVE-2020-10985.json b/2020/10xxx/CVE-2020-10985.json index 6ef7b93d8f5..e851ddf0368 100644 --- a/2020/10xxx/CVE-2020-10985.json +++ b/2020/10xxx/CVE-2020-10985.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10985", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10985", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Gambio GX before 4.0.1.0 allows XSS in admin/coupon_admin.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2020-0035/", + "url": "https://herolab.usd.de/security-advisories/usd-2020-0035/" } ] } diff --git a/2020/11xxx/CVE-2020-11474.json b/2020/11xxx/CVE-2020-11474.json index 4896c05c9d1..53defbfa667 100644 --- a/2020/11xxx/CVE-2020-11474.json +++ b/2020/11xxx/CVE-2020-11474.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11474", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11474", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NCP Secure Enterprise Client before 10.15 r47589 allows a symbolic link attack on enumusb.reg via Support Assistant." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2020-0038/", + "url": "https://herolab.usd.de/security-advisories/usd-2020-0038/" } ] } diff --git a/2020/11xxx/CVE-2020-11476.json b/2020/11xxx/CVE-2020-11476.json index bf15f16733e..a40bdae3f4d 100644 --- a/2020/11xxx/CVE-2020-11476.json +++ b/2020/11xxx/CVE-2020-11476.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11476", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11476", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/" + }, + { + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2020-0041/", + "url": "https://herolab.usd.de/security-advisories/usd-2020-0041/" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/concrete5/concrete5/pull/8713", + "url": "https://github.com/concrete5/concrete5/pull/8713" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/concrete5/concrete5/releases/tag/8.5.3", + "url": "https://github.com/concrete5/concrete5/releases/tag/8.5.3" } ] } diff --git a/2020/13xxx/CVE-2020-13970.json b/2020/13xxx/CVE-2020-13970.json index fb8e3dbcc1f..10870a4ca7e 100644 --- a/2020/13xxx/CVE-2020-13970.json +++ b/2020/13xxx/CVE-2020-13970.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13970", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13970", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Shopware before 6.2.3 is vulnerable to a Server-Side Request Forgery (SSRF) in its \"Mediabrowser upload by URL\" feature. This allows an authenticated user to send HTTP, HTTPS, FTP, and SFTP requests on behalf of the Shopware platform server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.shopware.com/en/changelog/#6-2-3", + "url": "https://www.shopware.com/en/changelog/#6-2-3" + }, + { + "refsource": "CONFIRM", + "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020", + "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020" } ] } diff --git a/2020/13xxx/CVE-2020-13971.json b/2020/13xxx/CVE-2020-13971.json index 5ef5ada649c..bd81bbaf3ae 100644 --- a/2020/13xxx/CVE-2020-13971.json +++ b/2020/13xxx/CVE-2020-13971.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13971", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13971", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Shopware before 6.2.3, authenticated users are allowed to use the Mediabrowser fileupload feature to upload SVG images containing JavaScript. This leads to Persistent XSS. An uploaded image can be accessed without authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.shopware.com/en/changelog/#6-2-3", + "url": "https://www.shopware.com/en/changelog/#6-2-3" + }, + { + "refsource": "CONFIRM", + "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020", + "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020" } ] } diff --git a/2020/13xxx/CVE-2020-13997.json b/2020/13xxx/CVE-2020-13997.json index 4917a0fd700..a97ef5740ae 100644 --- a/2020/13xxx/CVE-2020-13997.json +++ b/2020/13xxx/CVE-2020-13997.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13997", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13997", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Shopware before 6.2.3, the database password is leaked to an unauthenticated user when a DriverException occurs and verbose error handling is enabled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.shopware.com/en/changelog/#6-2-3", + "url": "https://www.shopware.com/en/changelog/#6-2-3" + }, + { + "refsource": "CONFIRM", + "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020", + "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020" } ] } diff --git a/2020/16xxx/CVE-2020-16096.json b/2020/16xxx/CVE-2020-16096.json new file mode 100644 index 00000000000..199af2721ed --- /dev/null +++ b/2020/16xxx/CVE-2020-16096.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16096", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16097.json b/2020/16xxx/CVE-2020-16097.json new file mode 100644 index 00000000000..82018fab891 --- /dev/null +++ b/2020/16xxx/CVE-2020-16097.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16097", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16098.json b/2020/16xxx/CVE-2020-16098.json new file mode 100644 index 00000000000..3bc00177ac9 --- /dev/null +++ b/2020/16xxx/CVE-2020-16098.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16098", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16099.json b/2020/16xxx/CVE-2020-16099.json new file mode 100644 index 00000000000..3d4cc1dd319 --- /dev/null +++ b/2020/16xxx/CVE-2020-16099.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16099", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16100.json b/2020/16xxx/CVE-2020-16100.json new file mode 100644 index 00000000000..8e201a26c5c --- /dev/null +++ b/2020/16xxx/CVE-2020-16100.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16100", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16101.json b/2020/16xxx/CVE-2020-16101.json new file mode 100644 index 00000000000..87cebb36ea1 --- /dev/null +++ b/2020/16xxx/CVE-2020-16101.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16101", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16102.json b/2020/16xxx/CVE-2020-16102.json new file mode 100644 index 00000000000..2b6b30ac01e --- /dev/null +++ b/2020/16xxx/CVE-2020-16102.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16102", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16103.json b/2020/16xxx/CVE-2020-16103.json new file mode 100644 index 00000000000..9e5e1c22328 --- /dev/null +++ b/2020/16xxx/CVE-2020-16103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16104.json b/2020/16xxx/CVE-2020-16104.json new file mode 100644 index 00000000000..6886ff3ed20 --- /dev/null +++ b/2020/16xxx/CVE-2020-16104.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16104", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16105.json b/2020/16xxx/CVE-2020-16105.json new file mode 100644 index 00000000000..2d7e01eb3a2 --- /dev/null +++ b/2020/16xxx/CVE-2020-16105.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16105", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16106.json b/2020/16xxx/CVE-2020-16106.json new file mode 100644 index 00000000000..466774b4f45 --- /dev/null +++ b/2020/16xxx/CVE-2020-16106.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16106", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16107.json b/2020/16xxx/CVE-2020-16107.json new file mode 100644 index 00000000000..43548467716 --- /dev/null +++ b/2020/16xxx/CVE-2020-16107.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16107", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16108.json b/2020/16xxx/CVE-2020-16108.json new file mode 100644 index 00000000000..12ca2dcaafd --- /dev/null +++ b/2020/16xxx/CVE-2020-16108.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16108", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16109.json b/2020/16xxx/CVE-2020-16109.json new file mode 100644 index 00000000000..5a9400381b4 --- /dev/null +++ b/2020/16xxx/CVE-2020-16109.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16109", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16110.json b/2020/16xxx/CVE-2020-16110.json new file mode 100644 index 00000000000..e1bf9abb1fa --- /dev/null +++ b/2020/16xxx/CVE-2020-16110.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16110", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16111.json b/2020/16xxx/CVE-2020-16111.json new file mode 100644 index 00000000000..17c1bfea642 --- /dev/null +++ b/2020/16xxx/CVE-2020-16111.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16111", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16112.json b/2020/16xxx/CVE-2020-16112.json new file mode 100644 index 00000000000..aac306673a6 --- /dev/null +++ b/2020/16xxx/CVE-2020-16112.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16112", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16113.json b/2020/16xxx/CVE-2020-16113.json new file mode 100644 index 00000000000..b16c603c45a --- /dev/null +++ b/2020/16xxx/CVE-2020-16113.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16113", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16114.json b/2020/16xxx/CVE-2020-16114.json new file mode 100644 index 00000000000..3bdb0970639 --- /dev/null +++ b/2020/16xxx/CVE-2020-16114.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16114", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/16xxx/CVE-2020-16115.json b/2020/16xxx/CVE-2020-16115.json new file mode 100644 index 00000000000..1e82f0f5208 --- /dev/null +++ b/2020/16xxx/CVE-2020-16115.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-16115", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file