diff --git a/2019/19xxx/CVE-2019-19319.json b/2019/19xxx/CVE-2019-19319.json index 8ec8246879f..111426da398 100644 --- a/2019/19xxx/CVE-2019-19319.json +++ b/2019/19xxx/CVE-2019-19319.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2019/19xxx/CVE-2019-19462.json b/2019/19xxx/CVE-2019-19462.json index 2819395ad46..5b7626dca5b 100644 --- a/2019/19xxx/CVE-2019-19462.json +++ b/2019/19xxx/CVE-2019-19462.json @@ -81,6 +81,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] } diff --git a/2019/19xxx/CVE-2019-19768.json b/2019/19xxx/CVE-2019-19768.json index be16a19bdec..30d46940824 100644 --- a/2019/19xxx/CVE-2019-19768.json +++ b/2019/19xxx/CVE-2019-19768.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2019/20xxx/CVE-2019-20806.json b/2019/20xxx/CVE-2019-20806.json index 99781693b52..8955c6b2f3e 100644 --- a/2019/20xxx/CVE-2019-20806.json +++ b/2019/20xxx/CVE-2019-20806.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2019/20xxx/CVE-2019-20811.json b/2019/20xxx/CVE-2019-20811.json index f50ed1a6d88..43a7a6e4b1d 100644 --- a/2019/20xxx/CVE-2019-20811.json +++ b/2019/20xxx/CVE-2019-20811.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2019/2xxx/CVE-2019-2182.json b/2019/2xxx/CVE-2019-2182.json index 70ea3610fc1..c61804e86b9 100644 --- a/2019/2xxx/CVE-2019-2182.json +++ b/2019/2xxx/CVE-2019-2182.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] }, diff --git a/2019/3xxx/CVE-2019-3016.json b/2019/3xxx/CVE-2019-3016.json index a846bff7565..0e917b2c87a 100644 --- a/2019/3xxx/CVE-2019-3016.json +++ b/2019/3xxx/CVE-2019-3016.json @@ -111,6 +111,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] }, diff --git a/2019/5xxx/CVE-2019-5108.json b/2019/5xxx/CVE-2019-5108.json index 16bfa6eb961..f29baf00649 100644 --- a/2019/5xxx/CVE-2019-5108.json +++ b/2019/5xxx/CVE-2019-5108.json @@ -103,6 +103,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] }, diff --git a/2020/10xxx/CVE-2020-10705.json b/2020/10xxx/CVE-2020-10705.json index 86dc16b5bb0..97b9a7e8b15 100644 --- a/2020/10xxx/CVE-2020-10705.json +++ b/2020/10xxx/CVE-2020-10705.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-10705", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Undertow", + "version": { + "version_data": [ + { + "version_value": "Versions before Undertow 2.1.1.Final." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1803241", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1803241" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the \"Expect: 100-continue\" header may cause an out of memory error. This flaw may potentially lead to a denial of service." } ] } diff --git a/2020/10xxx/CVE-2020-10711.json b/2020/10xxx/CVE-2020-10711.json index eca43ee01f5..bd0283f80f4 100644 --- a/2020/10xxx/CVE-2020-10711.json +++ b/2020/10xxx/CVE-2020-10711.json @@ -63,6 +63,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] }, diff --git a/2020/10xxx/CVE-2020-10751.json b/2020/10xxx/CVE-2020-10751.json index 37c9cb8e8e9..2d9abf2d7cb 100644 --- a/2020/10xxx/CVE-2020-10751.json +++ b/2020/10xxx/CVE-2020-10751.json @@ -83,6 +83,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] }, diff --git a/2020/10xxx/CVE-2020-10757.json b/2020/10xxx/CVE-2020-10757.json index 64340a9050a..270b610a045 100644 --- a/2020/10xxx/CVE-2020-10757.json +++ b/2020/10xxx/CVE-2020-10757.json @@ -63,6 +63,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] }, diff --git a/2020/10xxx/CVE-2020-10942.json b/2020/10xxx/CVE-2020-10942.json index aeaee740101..4322393920f 100644 --- a/2020/10xxx/CVE-2020-10942.json +++ b/2020/10xxx/CVE-2020-10942.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/11xxx/CVE-2020-11494.json b/2020/11xxx/CVE-2020-11494.json index a76667771aa..c71682bef6c 100644 --- a/2020/11xxx/CVE-2020-11494.json +++ b/2020/11xxx/CVE-2020-11494.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/11xxx/CVE-2020-11565.json b/2020/11xxx/CVE-2020-11565.json index dba71207ea2..d54fc63b6de 100644 --- a/2020/11xxx/CVE-2020-11565.json +++ b/2020/11xxx/CVE-2020-11565.json @@ -106,6 +106,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/11xxx/CVE-2020-11608.json b/2020/11xxx/CVE-2020-11608.json index 0601e543f3f..e8a0c81638b 100644 --- a/2020/11xxx/CVE-2020-11608.json +++ b/2020/11xxx/CVE-2020-11608.json @@ -106,6 +106,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/11xxx/CVE-2020-11609.json b/2020/11xxx/CVE-2020-11609.json index 7a99e19376b..28e9eb06b8c 100644 --- a/2020/11xxx/CVE-2020-11609.json +++ b/2020/11xxx/CVE-2020-11609.json @@ -106,6 +106,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/11xxx/CVE-2020-11622.json b/2020/11xxx/CVE-2020-11622.json index 01d64615697..2b525752519 100644 --- a/2020/11xxx/CVE-2020-11622.json +++ b/2020/11xxx/CVE-2020-11622.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11622", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11622", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.arista.com/en/support/advisories-notices", + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices" + }, + { + "refsource": "CONFIRM", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49" } ] } diff --git a/2020/11xxx/CVE-2020-11652.json b/2020/11xxx/CVE-2020-11652.json index db654146555..0a5dae43264 100644 --- a/2020/11xxx/CVE-2020-11652.json +++ b/2020/11xxx/CVE-2020-11652.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200530 [SECURITY] [DLA 2223-1] salt security update", "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html" + }, + { + "refsource": "MISC", + "name": "http://support.blackberry.com/kb/articleDetail?articleNumber=000063758", + "url": "http://support.blackberry.com/kb/articleDetail?articleNumber=000063758" } ] } diff --git a/2020/11xxx/CVE-2020-11668.json b/2020/11xxx/CVE-2020-11668.json index 3c079681edc..d7c55ce34b2 100644 --- a/2020/11xxx/CVE-2020-11668.json +++ b/2020/11xxx/CVE-2020-11668.json @@ -106,6 +106,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/12xxx/CVE-2020-12114.json b/2020/12xxx/CVE-2020-12114.json index 33ab3106988..dc6eb8769e3 100644 --- a/2020/12xxx/CVE-2020-12114.json +++ b/2020/12xxx/CVE-2020-12114.json @@ -76,6 +76,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] } diff --git a/2020/12xxx/CVE-2020-12464.json b/2020/12xxx/CVE-2020-12464.json index 7e85972a783..1d830509d71 100644 --- a/2020/12xxx/CVE-2020-12464.json +++ b/2020/12xxx/CVE-2020-12464.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/12xxx/CVE-2020-12652.json b/2020/12xxx/CVE-2020-12652.json index d9d417b758c..28fd463259f 100644 --- a/2020/12xxx/CVE-2020-12652.json +++ b/2020/12xxx/CVE-2020-12652.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/12xxx/CVE-2020-12653.json b/2020/12xxx/CVE-2020-12653.json index bf4436addd9..407131425ee 100644 --- a/2020/12xxx/CVE-2020-12653.json +++ b/2020/12xxx/CVE-2020-12653.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/12xxx/CVE-2020-12654.json b/2020/12xxx/CVE-2020-12654.json index df8f0747560..ff28ae378a3 100644 --- a/2020/12xxx/CVE-2020-12654.json +++ b/2020/12xxx/CVE-2020-12654.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/12xxx/CVE-2020-12768.json b/2020/12xxx/CVE-2020-12768.json index 41f07d92cf5..3d4b0074fe7 100644 --- a/2020/12xxx/CVE-2020-12768.json +++ b/2020/12xxx/CVE-2020-12768.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1171736#c3", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1171736#c3" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] } diff --git a/2020/12xxx/CVE-2020-12770.json b/2020/12xxx/CVE-2020-12770.json index eeedcca4679..0a55648baea 100644 --- a/2020/12xxx/CVE-2020-12770.json +++ b/2020/12xxx/CVE-2020-12770.json @@ -96,6 +96,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] } diff --git a/2020/13xxx/CVE-2020-13143.json b/2020/13xxx/CVE-2020-13143.json index 1274231c090..e38aae27c29 100644 --- a/2020/13xxx/CVE-2020-13143.json +++ b/2020/13xxx/CVE-2020-13143.json @@ -81,6 +81,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4699", + "url": "https://www.debian.org/security/2020/dsa-4699" } ] } diff --git a/2020/13xxx/CVE-2020-13238.json b/2020/13xxx/CVE-2020-13238.json index 4f3b6f13274..ce890768299 100644 --- a/2020/13xxx/CVE-2020-13238.json +++ b/2020/13xxx/CVE-2020-13238.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13238", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13238", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Mitsubishi MELSEC iQ-R Series PLCs with firmware 33 allow attackers to halt the industrial process by sending an unauthenticated crafted packet over the network, because this denial of service attack consumes excessive CPU time. After halting, physical access to the PLC is required in order to restore production." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-001_en.pdf", + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-001_en.pdf" + }, + { + "refsource": "MISC", + "name": "http://jvn.jp/vu/JVNVU97662844/index.html", + "url": "http://jvn.jp/vu/JVNVU97662844/index.html" } ] } diff --git a/2020/13xxx/CVE-2020-13964.json b/2020/13xxx/CVE-2020-13964.json index dbaaa13c64b..a785b946da4 100644 --- a/2020/13xxx/CVE-2020-13964.json +++ b/2020/13xxx/CVE-2020-13964.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/releases/tag/1.4.5", + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.4.5" + }, { "url": "https://github.com/roundcube/roundcubemail/commit/37e2bc745723ef6322f0f785aefd0b9313a40f19", "refsource": "MISC", diff --git a/2020/13xxx/CVE-2020-13965.json b/2020/13xxx/CVE-2020-13965.json index 54dcbb6cc69..11c50ed0bf1 100644 --- a/2020/13xxx/CVE-2020-13965.json +++ b/2020/13xxx/CVE-2020-13965.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/releases/tag/1.4.5", + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.4.5" + }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.3.12", "refsource": "MISC", diff --git a/2020/14xxx/CVE-2020-14013.json b/2020/14xxx/CVE-2020-14013.json new file mode 100644 index 00000000000..38317069849 --- /dev/null +++ b/2020/14xxx/CVE-2020-14013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/2xxx/CVE-2020-2732.json b/2020/2xxx/CVE-2020-2732.json index 6f619240299..21378bd174c 100644 --- a/2020/2xxx/CVE-2020-2732.json +++ b/2020/2xxx/CVE-2020-2732.json @@ -128,6 +128,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/4xxx/CVE-2020-4043.json b/2020/4xxx/CVE-2020-4043.json index 86ef97a29ac..a3387c403c3 100644 --- a/2020/4xxx/CVE-2020-4043.json +++ b/2020/4xxx/CVE-2020-4043.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper.\n\nUploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected.\n\nThis has been fixed in version 1.6.0." + "value": "phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected. This has been fixed in version 1.6.0." } ] }, diff --git a/2020/8xxx/CVE-2020-8428.json b/2020/8xxx/CVE-2020-8428.json index d21b5062a0c..2cd88cb221e 100644 --- a/2020/8xxx/CVE-2020-8428.json +++ b/2020/8xxx/CVE-2020-8428.json @@ -126,6 +126,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] }, diff --git a/2020/8xxx/CVE-2020-8647.json b/2020/8xxx/CVE-2020-8647.json index d8f7ca4f870..119cb75d93b 100644 --- a/2020/8xxx/CVE-2020-8647.json +++ b/2020/8xxx/CVE-2020-8647.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/8xxx/CVE-2020-8648.json b/2020/8xxx/CVE-2020-8648.json index 3ea448cea76..acbd6faf56a 100644 --- a/2020/8xxx/CVE-2020-8648.json +++ b/2020/8xxx/CVE-2020-8648.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/8xxx/CVE-2020-8649.json b/2020/8xxx/CVE-2020-8649.json index 77ad307084f..e0fd871c372 100644 --- a/2020/8xxx/CVE-2020-8649.json +++ b/2020/8xxx/CVE-2020-8649.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] } diff --git a/2020/9xxx/CVE-2020-9383.json b/2020/9xxx/CVE-2020-9383.json index 5d176fe6f2a..bc53622bb1f 100644 --- a/2020/9xxx/CVE-2020-9383.json +++ b/2020/9xxx/CVE-2020-9383.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4698", + "url": "https://www.debian.org/security/2020/dsa-4698" } ] }