From 2b95605ff23906abfa4d2154c25ee29a8ca842f9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 19 Jun 2020 17:01:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/18xxx/CVE-2017-18870.json | 56 +++++++++- 2017/18xxx/CVE-2017-18871.json | 56 +++++++++- 2017/18xxx/CVE-2017-18875.json | 56 +++++++++- 2017/18xxx/CVE-2017-18876.json | 56 +++++++++- 2017/18xxx/CVE-2017-18877.json | 56 +++++++++- 2018/21xxx/CVE-2018-21248.json | 56 +++++++++- 2018/21xxx/CVE-2018-21249.json | 56 +++++++++- 2018/21xxx/CVE-2018-21250.json | 56 +++++++++- 2018/21xxx/CVE-2018-21251.json | 56 +++++++++- 2018/21xxx/CVE-2018-21254.json | 56 +++++++++- 2018/21xxx/CVE-2018-21255.json | 56 +++++++++- 2018/21xxx/CVE-2018-21257.json | 56 +++++++++- 2018/21xxx/CVE-2018-21259.json | 56 +++++++++- 2018/21xxx/CVE-2018-21260.json | 56 +++++++++- 2018/21xxx/CVE-2018-21261.json | 56 +++++++++- 2018/21xxx/CVE-2018-21262.json | 56 +++++++++- 2018/21xxx/CVE-2018-21263.json | 56 +++++++++- 2018/21xxx/CVE-2018-21265.json | 56 +++++++++- 2019/20xxx/CVE-2019-20886.json | 56 +++++++++- 2019/20xxx/CVE-2019-20888.json | 56 +++++++++- 2019/20xxx/CVE-2019-20889.json | 56 +++++++++- 2020/14xxx/CVE-2020-14474.json | 18 +++ 2020/14xxx/CVE-2020-14475.json | 18 +++ 2020/14xxx/CVE-2020-14476.json | 18 +++ 2020/14xxx/CVE-2020-14477.json | 18 +++ 2020/14xxx/CVE-2020-14478.json | 18 +++ 2020/14xxx/CVE-2020-14479.json | 18 +++ 2020/14xxx/CVE-2020-14480.json | 18 +++ 2020/14xxx/CVE-2020-14481.json | 18 +++ 2020/14xxx/CVE-2020-14482.json | 18 +++ 2020/14xxx/CVE-2020-14483.json | 18 +++ 2020/14xxx/CVE-2020-14687.json | 18 +++ 2020/14xxx/CVE-2020-14688.json | 18 +++ 2020/14xxx/CVE-2020-14689.json | 18 +++ 2020/14xxx/CVE-2020-14690.json | 18 +++ 2020/14xxx/CVE-2020-14691.json | 18 +++ 2020/14xxx/CVE-2020-14692.json | 18 +++ 2020/14xxx/CVE-2020-14693.json | 18 +++ 2020/14xxx/CVE-2020-14694.json | 18 +++ 2020/14xxx/CVE-2020-14695.json | 18 +++ 2020/14xxx/CVE-2020-14696.json | 18 +++ 2020/14xxx/CVE-2020-14697.json | 18 +++ 2020/14xxx/CVE-2020-14698.json | 18 +++ 2020/14xxx/CVE-2020-14699.json | 18 +++ 2020/14xxx/CVE-2020-14700.json | 18 +++ 2020/14xxx/CVE-2020-14701.json | 18 +++ 2020/14xxx/CVE-2020-14702.json | 18 +++ 2020/14xxx/CVE-2020-14703.json | 18 +++ 2020/14xxx/CVE-2020-14704.json | 18 +++ 2020/14xxx/CVE-2020-14705.json | 18 +++ 2020/14xxx/CVE-2020-14706.json | 18 +++ 2020/14xxx/CVE-2020-14707.json | 18 +++ 2020/14xxx/CVE-2020-14708.json | 18 +++ 2020/14xxx/CVE-2020-14709.json | 18 +++ 2020/14xxx/CVE-2020-14710.json | 18 +++ 2020/14xxx/CVE-2020-14711.json | 18 +++ 2020/14xxx/CVE-2020-14712.json | 18 +++ 2020/14xxx/CVE-2020-14713.json | 18 +++ 2020/14xxx/CVE-2020-14714.json | 18 +++ 2020/14xxx/CVE-2020-14715.json | 18 +++ 2020/14xxx/CVE-2020-14716.json | 18 +++ 2020/14xxx/CVE-2020-14717.json | 18 +++ 2020/14xxx/CVE-2020-14718.json | 18 +++ 2020/14xxx/CVE-2020-14719.json | 18 +++ 2020/14xxx/CVE-2020-14720.json | 18 +++ 2020/14xxx/CVE-2020-14721.json | 18 +++ 2020/14xxx/CVE-2020-14722.json | 18 +++ 2020/14xxx/CVE-2020-14723.json | 18 +++ 2020/14xxx/CVE-2020-14724.json | 18 +++ 2020/14xxx/CVE-2020-14725.json | 18 +++ 2020/14xxx/CVE-2020-14726.json | 18 +++ 2020/14xxx/CVE-2020-14727.json | 18 +++ 2020/14xxx/CVE-2020-14728.json | 18 +++ 2020/14xxx/CVE-2020-14729.json | 18 +++ 2020/14xxx/CVE-2020-14730.json | 18 +++ 2020/14xxx/CVE-2020-14731.json | 18 +++ 2020/14xxx/CVE-2020-14732.json | 18 +++ 2020/14xxx/CVE-2020-14733.json | 18 +++ 2020/14xxx/CVE-2020-14734.json | 18 +++ 2020/14xxx/CVE-2020-14735.json | 18 +++ 2020/14xxx/CVE-2020-14736.json | 18 +++ 2020/14xxx/CVE-2020-14737.json | 18 +++ 2020/14xxx/CVE-2020-14738.json | 18 +++ 2020/14xxx/CVE-2020-14739.json | 18 +++ 2020/14xxx/CVE-2020-14926.json | 18 +++ 2020/14xxx/CVE-2020-14927.json | 18 +++ 2020/4xxx/CVE-2020-4281.json | 190 ++++++++++++++++---------------- 2020/4xxx/CVE-2020-4295.json | 192 ++++++++++++++++---------------- 2020/4xxx/CVE-2020-4297.json | 194 ++++++++++++++++----------------- 2020/8xxx/CVE-2020-8184.json | 55 +++++++++- 90 files changed, 2560 insertions(+), 417 deletions(-) create mode 100644 2020/14xxx/CVE-2020-14474.json create mode 100644 2020/14xxx/CVE-2020-14475.json create mode 100644 2020/14xxx/CVE-2020-14476.json create mode 100644 2020/14xxx/CVE-2020-14477.json create mode 100644 2020/14xxx/CVE-2020-14478.json create mode 100644 2020/14xxx/CVE-2020-14479.json create mode 100644 2020/14xxx/CVE-2020-14480.json create mode 100644 2020/14xxx/CVE-2020-14481.json create mode 100644 2020/14xxx/CVE-2020-14482.json create mode 100644 2020/14xxx/CVE-2020-14483.json create mode 100644 2020/14xxx/CVE-2020-14687.json create mode 100644 2020/14xxx/CVE-2020-14688.json create mode 100644 2020/14xxx/CVE-2020-14689.json create mode 100644 2020/14xxx/CVE-2020-14690.json create mode 100644 2020/14xxx/CVE-2020-14691.json create mode 100644 2020/14xxx/CVE-2020-14692.json create mode 100644 2020/14xxx/CVE-2020-14693.json create mode 100644 2020/14xxx/CVE-2020-14694.json create mode 100644 2020/14xxx/CVE-2020-14695.json create mode 100644 2020/14xxx/CVE-2020-14696.json create mode 100644 2020/14xxx/CVE-2020-14697.json create mode 100644 2020/14xxx/CVE-2020-14698.json create mode 100644 2020/14xxx/CVE-2020-14699.json create mode 100644 2020/14xxx/CVE-2020-14700.json create mode 100644 2020/14xxx/CVE-2020-14701.json create mode 100644 2020/14xxx/CVE-2020-14702.json create mode 100644 2020/14xxx/CVE-2020-14703.json create mode 100644 2020/14xxx/CVE-2020-14704.json create mode 100644 2020/14xxx/CVE-2020-14705.json create mode 100644 2020/14xxx/CVE-2020-14706.json create mode 100644 2020/14xxx/CVE-2020-14707.json create mode 100644 2020/14xxx/CVE-2020-14708.json create mode 100644 2020/14xxx/CVE-2020-14709.json create mode 100644 2020/14xxx/CVE-2020-14710.json create mode 100644 2020/14xxx/CVE-2020-14711.json create mode 100644 2020/14xxx/CVE-2020-14712.json create mode 100644 2020/14xxx/CVE-2020-14713.json create mode 100644 2020/14xxx/CVE-2020-14714.json create mode 100644 2020/14xxx/CVE-2020-14715.json create mode 100644 2020/14xxx/CVE-2020-14716.json create mode 100644 2020/14xxx/CVE-2020-14717.json create mode 100644 2020/14xxx/CVE-2020-14718.json create mode 100644 2020/14xxx/CVE-2020-14719.json create mode 100644 2020/14xxx/CVE-2020-14720.json create mode 100644 2020/14xxx/CVE-2020-14721.json create mode 100644 2020/14xxx/CVE-2020-14722.json create mode 100644 2020/14xxx/CVE-2020-14723.json create mode 100644 2020/14xxx/CVE-2020-14724.json create mode 100644 2020/14xxx/CVE-2020-14725.json create mode 100644 2020/14xxx/CVE-2020-14726.json create mode 100644 2020/14xxx/CVE-2020-14727.json create mode 100644 2020/14xxx/CVE-2020-14728.json create mode 100644 2020/14xxx/CVE-2020-14729.json create mode 100644 2020/14xxx/CVE-2020-14730.json create mode 100644 2020/14xxx/CVE-2020-14731.json create mode 100644 2020/14xxx/CVE-2020-14732.json create mode 100644 2020/14xxx/CVE-2020-14733.json create mode 100644 2020/14xxx/CVE-2020-14734.json create mode 100644 2020/14xxx/CVE-2020-14735.json create mode 100644 2020/14xxx/CVE-2020-14736.json create mode 100644 2020/14xxx/CVE-2020-14737.json create mode 100644 2020/14xxx/CVE-2020-14738.json create mode 100644 2020/14xxx/CVE-2020-14739.json create mode 100644 2020/14xxx/CVE-2020-14926.json create mode 100644 2020/14xxx/CVE-2020-14927.json diff --git a/2017/18xxx/CVE-2017-18870.json b/2017/18xxx/CVE-2017-18870.json index 7b469bbbb9e..b5a1c888505 100644 --- a/2017/18xxx/CVE-2017-18870.json +++ b/2017/18xxx/CVE-2017-18870.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18870", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18870", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.5.0, 4.4.5, and 4.3.4. It mishandled webhook access control in the EnableOnlyAdminIntegrations case." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2017/18xxx/CVE-2017-18871.json b/2017/18xxx/CVE-2017-18871.json index ecb0e8ce496..124f5bda6f7 100644 --- a/2017/18xxx/CVE-2017-18871.json +++ b/2017/18xxx/CVE-2017-18871.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18871", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18871", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.5.0, 4.4.5, 4.3.4, and 4.2.2. It allows attackers to cause a denial of service (application crash) via an @ character before a JavaScript field name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2017/18xxx/CVE-2017-18875.json b/2017/18xxx/CVE-2017-18875.json index 6d2bbe7ceaf..cdd286230e7 100644 --- a/2017/18xxx/CVE-2017-18875.json +++ b/2017/18xxx/CVE-2017-18875.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18875", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18875", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2 when local storage for files is used. A System Admin can create arbitrary files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2017/18xxx/CVE-2017-18876.json b/2017/18xxx/CVE-2017-18876.json index 45668de0294..c1b49af92f5 100644 --- a/2017/18xxx/CVE-2017-18876.json +++ b/2017/18xxx/CVE-2017-18876.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18876", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18876", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2 when local storage for files is used. A System Admin can test for the existence of an arbitrary file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2017/18xxx/CVE-2017-18877.json b/2017/18xxx/CVE-2017-18877.json index 5dbb2e6bf3c..dbf2beab271 100644 --- a/2017/18xxx/CVE-2017-18877.json +++ b/2017/18xxx/CVE-2017-18877.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18877", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18877", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. XSS attacks could occur against an OAuth 2.0 allow/deny page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21248.json b/2018/21xxx/CVE-2018-21248.json index 795f042fa21..22a8c3ba261 100644 --- a/2018/21xxx/CVE-2018-21248.json +++ b/2018/21xxx/CVE-2018-21248.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21248", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21248", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.4.0. It mishandles possession of superfluous authentication credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21249.json b/2018/21xxx/CVE-2018-21249.json index e481286a61f..2e675069e1d 100644 --- a/2018/21xxx/CVE-2018-21249.json +++ b/2018/21xxx/CVE-2018-21249.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21249", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21249", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.3.0. It mishandles timing." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21250.json b/2018/21xxx/CVE-2018-21250.json index 257c8675b1f..e9bd0c94e78 100644 --- a/2018/21xxx/CVE-2018-21250.json +++ b/2018/21xxx/CVE-2018-21250.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21250", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21250", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.2.2, 5.1.2, and 4.10.4. It allows remote attackers to cause a denial of service (memory consumption) via crafted image dimensions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21251.json b/2018/21xxx/CVE-2018-21251.json index 2e2c6b1ef77..4f496f2ffb7 100644 --- a/2018/21xxx/CVE-2018-21251.json +++ b/2018/21xxx/CVE-2018-21251.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21251", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21251", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.2 and 5.1.1. Authorization could be bypassed if the channel name were not the same in the params and the body." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21254.json b/2018/21xxx/CVE-2018-21254.json index 46041b4294d..63a5a6fafaf 100644 --- a/2018/21xxx/CVE-2018-21254.json +++ b/2018/21xxx/CVE-2018-21254.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21254", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21254", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.1. An attacker can bypass intended access control (for direct-message channel creation) via the Message slash command." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21255.json b/2018/21xxx/CVE-2018-21255.json index c285a1b0c68..30f2e46fef2 100644 --- a/2018/21xxx/CVE-2018-21255.json +++ b/2018/21xxx/CVE-2018-21255.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21255", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21255", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.1. Non-members of a channel could use the Channel PATCH API to modify that channel." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21257.json b/2018/21xxx/CVE-2018-21257.json index 0182af5dcea..f93f1a80f99 100644 --- a/2018/21xxx/CVE-2018-21257.json +++ b/2018/21xxx/CVE-2018-21257.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21257", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21257", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.1. It allows attackers to bypass intended access restrictions (for setting a channel header) via the Channel header slash command API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21259.json b/2018/21xxx/CVE-2018-21259.json index f3da58f0aa5..ee3a5b577fa 100644 --- a/2018/21xxx/CVE-2018-21259.json +++ b/2018/21xxx/CVE-2018-21259.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21259", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21259", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.10.1, 4.9.4, and 4.8.2. It allows attackers to cause a denial of service (application hang) via a malformed link in a channel." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21260.json b/2018/21xxx/CVE-2018-21260.json index b697e31324e..e165b5d8497 100644 --- a/2018/21xxx/CVE-2018-21260.json +++ b/2018/21xxx/CVE-2018-21260.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21260", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21260", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.8.1, 4.7.4, and 4.6.3. WebSocket events were accidentally sent during certain user-management operations, violating user privacy." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21261.json b/2018/21xxx/CVE-2018-21261.json index 22ff0150b3b..e0f090fea74 100644 --- a/2018/21xxx/CVE-2018-21261.json +++ b/2018/21xxx/CVE-2018-21261.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21261", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21261", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.8.1, 4.7.4, and 4.6.3. An e-mail invite accidentally included the team invite_id, which leads to unintended excessive invitation privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21262.json b/2018/21xxx/CVE-2018-21262.json index 18bf8ae0f6f..2b21b2104d8 100644 --- a/2018/21xxx/CVE-2018-21262.json +++ b/2018/21xxx/CVE-2018-21262.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21262", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21262", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.7.3. It allows attackers to cause a denial of service (application crash) via invalid LaTeX text." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21263.json b/2018/21xxx/CVE-2018-21263.json index 9c9384c6bd2..9e766e33904 100644 --- a/2018/21xxx/CVE-2018-21263.json +++ b/2018/21xxx/CVE-2018-21263.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21263", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21263", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 4.7.0, 4.6.2, and 4.5.2. An attacker could authenticate to a different user's account via a crafted SAML response." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2018/21xxx/CVE-2018-21265.json b/2018/21xxx/CVE-2018-21265.json index fdffd121aa7..45e001b62ae 100644 --- a/2018/21xxx/CVE-2018-21265.json +++ b/2018/21xxx/CVE-2018-21265.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2018-21265", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2018-21265", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Desktop App before 4.0.0. It mishandled the Same Origin Policy for setPermissionRequestHandler (e.g., video, audio, and notifications)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20886.json b/2019/20xxx/CVE-2019-20886.json index 6548e0cb5d0..9f1b59b287c 100644 --- a/2019/20xxx/CVE-2019-20886.json +++ b/2019/20xxx/CVE-2019-20886.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20886", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20886", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.8.0. The first user is sometimes inadvertently a system admin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20888.json b/2019/20xxx/CVE-2019-20888.json index c471d0d54d5..eff7b9403b2 100644 --- a/2019/20xxx/CVE-2019-20888.json +++ b/2019/20xxx/CVE-2019-20888.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20888", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20888", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.7, 5.6.3, 5.5.2, and 4.10.5. It allows attackers to cause a denial of service (memory consumption) via an outgoing webhook or a slash command integration." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20889.json b/2019/20xxx/CVE-2019-20889.json index 302a2067c42..0f9b6fb00de 100644 --- a/2019/20xxx/CVE-2019-20889.json +++ b/2019/20xxx/CVE-2019-20889.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20889", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20889", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.7, 5.6.3, 5.5.2, and 4.10.5. It mishandles permissions for user-access token creation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2020/14xxx/CVE-2020-14474.json b/2020/14xxx/CVE-2020-14474.json new file mode 100644 index 00000000000..7371485074b --- /dev/null +++ b/2020/14xxx/CVE-2020-14474.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14474", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14475.json b/2020/14xxx/CVE-2020-14475.json new file mode 100644 index 00000000000..08b70eadc34 --- /dev/null +++ b/2020/14xxx/CVE-2020-14475.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14475", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14476.json b/2020/14xxx/CVE-2020-14476.json new file mode 100644 index 00000000000..a4f57140967 --- /dev/null +++ b/2020/14xxx/CVE-2020-14476.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14476", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14477.json b/2020/14xxx/CVE-2020-14477.json new file mode 100644 index 00000000000..8ded7e04c4a --- /dev/null +++ b/2020/14xxx/CVE-2020-14477.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14477", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14478.json b/2020/14xxx/CVE-2020-14478.json new file mode 100644 index 00000000000..19865ef1bef --- /dev/null +++ b/2020/14xxx/CVE-2020-14478.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14478", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14479.json b/2020/14xxx/CVE-2020-14479.json new file mode 100644 index 00000000000..8081dfe17b8 --- /dev/null +++ b/2020/14xxx/CVE-2020-14479.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14479", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14480.json b/2020/14xxx/CVE-2020-14480.json new file mode 100644 index 00000000000..e4c0411b145 --- /dev/null +++ b/2020/14xxx/CVE-2020-14480.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14480", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14481.json b/2020/14xxx/CVE-2020-14481.json new file mode 100644 index 00000000000..b1b2dae7d41 --- /dev/null +++ b/2020/14xxx/CVE-2020-14481.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14481", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14482.json b/2020/14xxx/CVE-2020-14482.json new file mode 100644 index 00000000000..7d4d911b9ec --- /dev/null +++ b/2020/14xxx/CVE-2020-14482.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14482", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14483.json b/2020/14xxx/CVE-2020-14483.json new file mode 100644 index 00000000000..8ced875e9ae --- /dev/null +++ b/2020/14xxx/CVE-2020-14483.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14483", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14687.json b/2020/14xxx/CVE-2020-14687.json new file mode 100644 index 00000000000..dc4b081cdd8 --- /dev/null +++ b/2020/14xxx/CVE-2020-14687.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14687", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14688.json b/2020/14xxx/CVE-2020-14688.json new file mode 100644 index 00000000000..d821747f474 --- /dev/null +++ b/2020/14xxx/CVE-2020-14688.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14688", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14689.json b/2020/14xxx/CVE-2020-14689.json new file mode 100644 index 00000000000..91d42350997 --- /dev/null +++ b/2020/14xxx/CVE-2020-14689.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14689", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14690.json b/2020/14xxx/CVE-2020-14690.json new file mode 100644 index 00000000000..ad0b1260d90 --- /dev/null +++ b/2020/14xxx/CVE-2020-14690.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14690", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14691.json b/2020/14xxx/CVE-2020-14691.json new file mode 100644 index 00000000000..a38262823ee --- /dev/null +++ b/2020/14xxx/CVE-2020-14691.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14691", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14692.json b/2020/14xxx/CVE-2020-14692.json new file mode 100644 index 00000000000..ea7cc4eb727 --- /dev/null +++ b/2020/14xxx/CVE-2020-14692.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14692", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14693.json b/2020/14xxx/CVE-2020-14693.json new file mode 100644 index 00000000000..87e923d96ef --- /dev/null +++ b/2020/14xxx/CVE-2020-14693.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14693", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14694.json b/2020/14xxx/CVE-2020-14694.json new file mode 100644 index 00000000000..012a183602d --- /dev/null +++ b/2020/14xxx/CVE-2020-14694.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14694", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14695.json b/2020/14xxx/CVE-2020-14695.json new file mode 100644 index 00000000000..676236fcf84 --- /dev/null +++ b/2020/14xxx/CVE-2020-14695.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14695", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14696.json b/2020/14xxx/CVE-2020-14696.json new file mode 100644 index 00000000000..58dd6c4de28 --- /dev/null +++ b/2020/14xxx/CVE-2020-14696.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14696", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14697.json b/2020/14xxx/CVE-2020-14697.json new file mode 100644 index 00000000000..9c561b97276 --- /dev/null +++ b/2020/14xxx/CVE-2020-14697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14698.json b/2020/14xxx/CVE-2020-14698.json new file mode 100644 index 00000000000..22469f2dc95 --- /dev/null +++ b/2020/14xxx/CVE-2020-14698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14699.json b/2020/14xxx/CVE-2020-14699.json new file mode 100644 index 00000000000..d52bbdb3b46 --- /dev/null +++ b/2020/14xxx/CVE-2020-14699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14700.json b/2020/14xxx/CVE-2020-14700.json new file mode 100644 index 00000000000..dd40d8ff5d2 --- /dev/null +++ b/2020/14xxx/CVE-2020-14700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14701.json b/2020/14xxx/CVE-2020-14701.json new file mode 100644 index 00000000000..74bfcecc7aa --- /dev/null +++ b/2020/14xxx/CVE-2020-14701.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14701", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14702.json b/2020/14xxx/CVE-2020-14702.json new file mode 100644 index 00000000000..740d1c68cc3 --- /dev/null +++ b/2020/14xxx/CVE-2020-14702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14703.json b/2020/14xxx/CVE-2020-14703.json new file mode 100644 index 00000000000..307512750ef --- /dev/null +++ b/2020/14xxx/CVE-2020-14703.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14703", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14704.json b/2020/14xxx/CVE-2020-14704.json new file mode 100644 index 00000000000..fdc214fedee --- /dev/null +++ b/2020/14xxx/CVE-2020-14704.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14704", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14705.json b/2020/14xxx/CVE-2020-14705.json new file mode 100644 index 00000000000..7ea0b12a4e0 --- /dev/null +++ b/2020/14xxx/CVE-2020-14705.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14705", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14706.json b/2020/14xxx/CVE-2020-14706.json new file mode 100644 index 00000000000..fb300c4a4de --- /dev/null +++ b/2020/14xxx/CVE-2020-14706.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14706", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14707.json b/2020/14xxx/CVE-2020-14707.json new file mode 100644 index 00000000000..b3719743e92 --- /dev/null +++ b/2020/14xxx/CVE-2020-14707.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14707", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14708.json b/2020/14xxx/CVE-2020-14708.json new file mode 100644 index 00000000000..c9cd878750b --- /dev/null +++ b/2020/14xxx/CVE-2020-14708.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14708", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14709.json b/2020/14xxx/CVE-2020-14709.json new file mode 100644 index 00000000000..48b71af5e6d --- /dev/null +++ b/2020/14xxx/CVE-2020-14709.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14709", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14710.json b/2020/14xxx/CVE-2020-14710.json new file mode 100644 index 00000000000..49caa073585 --- /dev/null +++ b/2020/14xxx/CVE-2020-14710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14711.json b/2020/14xxx/CVE-2020-14711.json new file mode 100644 index 00000000000..cb2cdfa44ea --- /dev/null +++ b/2020/14xxx/CVE-2020-14711.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14711", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14712.json b/2020/14xxx/CVE-2020-14712.json new file mode 100644 index 00000000000..afadc7dcf3d --- /dev/null +++ b/2020/14xxx/CVE-2020-14712.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14712", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14713.json b/2020/14xxx/CVE-2020-14713.json new file mode 100644 index 00000000000..ec5e79805f4 --- /dev/null +++ b/2020/14xxx/CVE-2020-14713.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14713", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14714.json b/2020/14xxx/CVE-2020-14714.json new file mode 100644 index 00000000000..c7c379a9b06 --- /dev/null +++ b/2020/14xxx/CVE-2020-14714.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14714", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14715.json b/2020/14xxx/CVE-2020-14715.json new file mode 100644 index 00000000000..d8854b6151b --- /dev/null +++ b/2020/14xxx/CVE-2020-14715.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14715", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14716.json b/2020/14xxx/CVE-2020-14716.json new file mode 100644 index 00000000000..106cd102a51 --- /dev/null +++ b/2020/14xxx/CVE-2020-14716.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14716", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14717.json b/2020/14xxx/CVE-2020-14717.json new file mode 100644 index 00000000000..f2b8d8dc79f --- /dev/null +++ b/2020/14xxx/CVE-2020-14717.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14717", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14718.json b/2020/14xxx/CVE-2020-14718.json new file mode 100644 index 00000000000..f669826475b --- /dev/null +++ b/2020/14xxx/CVE-2020-14718.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14718", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14719.json b/2020/14xxx/CVE-2020-14719.json new file mode 100644 index 00000000000..0abd5887adc --- /dev/null +++ b/2020/14xxx/CVE-2020-14719.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14719", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14720.json b/2020/14xxx/CVE-2020-14720.json new file mode 100644 index 00000000000..ca1847fc6e0 --- /dev/null +++ b/2020/14xxx/CVE-2020-14720.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14720", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14721.json b/2020/14xxx/CVE-2020-14721.json new file mode 100644 index 00000000000..6070e7ad6ff --- /dev/null +++ b/2020/14xxx/CVE-2020-14721.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14721", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14722.json b/2020/14xxx/CVE-2020-14722.json new file mode 100644 index 00000000000..02f2e7dd24f --- /dev/null +++ b/2020/14xxx/CVE-2020-14722.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14722", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14723.json b/2020/14xxx/CVE-2020-14723.json new file mode 100644 index 00000000000..d6055ecfe0a --- /dev/null +++ b/2020/14xxx/CVE-2020-14723.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14723", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14724.json b/2020/14xxx/CVE-2020-14724.json new file mode 100644 index 00000000000..68bb07850be --- /dev/null +++ b/2020/14xxx/CVE-2020-14724.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14724", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14725.json b/2020/14xxx/CVE-2020-14725.json new file mode 100644 index 00000000000..ba0ae80a71d --- /dev/null +++ b/2020/14xxx/CVE-2020-14725.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14725", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14726.json b/2020/14xxx/CVE-2020-14726.json new file mode 100644 index 00000000000..9163e097d0f --- /dev/null +++ b/2020/14xxx/CVE-2020-14726.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14726", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14727.json b/2020/14xxx/CVE-2020-14727.json new file mode 100644 index 00000000000..5c469d32e5d --- /dev/null +++ b/2020/14xxx/CVE-2020-14727.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14727", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14728.json b/2020/14xxx/CVE-2020-14728.json new file mode 100644 index 00000000000..7a8d3dfb420 --- /dev/null +++ b/2020/14xxx/CVE-2020-14728.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14728", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14729.json b/2020/14xxx/CVE-2020-14729.json new file mode 100644 index 00000000000..e0b61d31fe8 --- /dev/null +++ b/2020/14xxx/CVE-2020-14729.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14729", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14730.json b/2020/14xxx/CVE-2020-14730.json new file mode 100644 index 00000000000..4bd701c844b --- /dev/null +++ b/2020/14xxx/CVE-2020-14730.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14730", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14731.json b/2020/14xxx/CVE-2020-14731.json new file mode 100644 index 00000000000..8cc53a5e04c --- /dev/null +++ b/2020/14xxx/CVE-2020-14731.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14731", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14732.json b/2020/14xxx/CVE-2020-14732.json new file mode 100644 index 00000000000..245f75082e4 --- /dev/null +++ b/2020/14xxx/CVE-2020-14732.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14732", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14733.json b/2020/14xxx/CVE-2020-14733.json new file mode 100644 index 00000000000..84548571928 --- /dev/null +++ b/2020/14xxx/CVE-2020-14733.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14733", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14734.json b/2020/14xxx/CVE-2020-14734.json new file mode 100644 index 00000000000..25ccf91a761 --- /dev/null +++ b/2020/14xxx/CVE-2020-14734.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14734", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14735.json b/2020/14xxx/CVE-2020-14735.json new file mode 100644 index 00000000000..ea0b81b7acb --- /dev/null +++ b/2020/14xxx/CVE-2020-14735.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14735", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14736.json b/2020/14xxx/CVE-2020-14736.json new file mode 100644 index 00000000000..b69af95aab5 --- /dev/null +++ b/2020/14xxx/CVE-2020-14736.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14736", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14737.json b/2020/14xxx/CVE-2020-14737.json new file mode 100644 index 00000000000..b90860a8d04 --- /dev/null +++ b/2020/14xxx/CVE-2020-14737.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14737", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14738.json b/2020/14xxx/CVE-2020-14738.json new file mode 100644 index 00000000000..7302183a52b --- /dev/null +++ b/2020/14xxx/CVE-2020-14738.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14738", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14739.json b/2020/14xxx/CVE-2020-14739.json new file mode 100644 index 00000000000..78c625639d7 --- /dev/null +++ b/2020/14xxx/CVE-2020-14739.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14739", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14926.json b/2020/14xxx/CVE-2020-14926.json new file mode 100644 index 00000000000..534bd8550f6 --- /dev/null +++ b/2020/14xxx/CVE-2020-14926.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14926", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14927.json b/2020/14xxx/CVE-2020-14927.json new file mode 100644 index 00000000000..878a1862741 --- /dev/null +++ b/2020/14xxx/CVE-2020-14927.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14927", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4281.json b/2020/4xxx/CVE-2020-4281.json index 8f01c0de1e4..ad8629be600 100644 --- a/2020/4xxx/CVE-2020-4281.json +++ b/2020/4xxx/CVE-2020-4281.json @@ -1,99 +1,99 @@ { - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6235162", - "url" : "https://www.ibm.com/support/pages/node/6235162", - "title" : "IBM Security Bulletin 6235162 (Rational DOORS Next Generation)" - }, - { - "name" : "ibm-dng-cve20204281-xss (176141)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/176141", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Rational DOORS Next Generation", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - } - ] - } - } - ] - } + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6235162", + "url": "https://www.ibm.com/support/pages/node/6235162", + "title": "IBM Security Bulletin 6235162 (Rational DOORS Next Generation)" + }, + { + "name": "ibm-dng-cve20204281-xss (176141)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/176141", + "title": "X-Force Vulnerability Report" } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Cross-Site Scripting", - "lang" : "eng" - } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Rational DOORS Next Generation", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + } + ] + } + } + ] + } + } ] - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4281", - "DATE_PUBLIC" : "2020-06-18T00:00:00" - }, - "impact" : { - "cvssv3" : { - "BM" : { - "A" : "N", - "SCORE" : "5.400", - "S" : "C", - "UI" : "R", - "I" : "L", - "PR" : "L", - "AC" : "L", - "C" : "L", - "AV" : "N" - }, - "TM" : { - "RL" : "O", - "E" : "H", - "RC" : "C" - } - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "value" : "IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176141.", - "lang" : "eng" - } - ] - } -} + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4281", + "DATE_PUBLIC": "2020-06-18T00:00:00" + }, + "impact": { + "cvssv3": { + "BM": { + "A": "N", + "SCORE": "5.400", + "S": "C", + "UI": "R", + "I": "L", + "PR": "L", + "AC": "L", + "C": "L", + "AV": "N" + }, + "TM": { + "RL": "O", + "E": "H", + "RC": "C" + } + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "value": "IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176141.", + "lang": "eng" + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4295.json b/2020/4xxx/CVE-2020-4295.json index 2c0ec9c5c7f..3bcffbec58b 100644 --- a/2020/4xxx/CVE-2020-4295.json +++ b/2020/4xxx/CVE-2020-4295.json @@ -1,99 +1,99 @@ { - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "H" - }, - "BM" : { - "S" : "C", - "SCORE" : "5.400", - "A" : "N", - "AV" : "N", - "C" : "L", - "I" : "L", - "PR" : "L", - "AC" : "L", - "UI" : "R" - } - } - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4295", - "DATE_PUBLIC" : "2020-06-18T00:00:00" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176408." - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - } - ] - }, - "product_name" : "Rational DOORS Next Generation" - } - ] - } + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "RL": "O", + "E": "H" + }, + "BM": { + "S": "C", + "SCORE": "5.400", + "A": "N", + "AV": "N", + "C": "L", + "I": "L", + "PR": "L", + "AC": "L", + "UI": "R" } - ] - } - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6235162 (Rational DOORS Next Generation)", - "url" : "https://www.ibm.com/support/pages/node/6235162", - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6235162" - }, - { - "title" : "X-Force Vulnerability Report", - "name" : "ibm-dng-cve20204295-xss (176408)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/176408" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Cross-Site Scripting", - "lang" : "eng" - } + } + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4295", + "DATE_PUBLIC": "2020-06-18T00:00:00" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176408." + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + } + ] + }, + "product_name": "Rational DOORS Next Generation" + } + ] + } + } ] - } - ] - } -} + } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6235162 (Rational DOORS Next Generation)", + "url": "https://www.ibm.com/support/pages/node/6235162", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6235162" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-dng-cve20204295-xss (176408)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/176408" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4297.json b/2020/4xxx/CVE-2020-4297.json index bb081d5e0f1..9e3b4a67198 100644 --- a/2020/4xxx/CVE-2020-4297.json +++ b/2020/4xxx/CVE-2020-4297.json @@ -1,99 +1,99 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Rational DOORS Next Generation", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" - } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Cross-Site Scripting", - "lang" : "eng" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Rational DOORS Next Generation", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6235162", - "name" : "https://www.ibm.com/support/pages/node/6235162", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6235162 (Rational DOORS Next Generation)" - }, - { - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/176474", - "refsource" : "XF", - "name" : "ibm-dng-cve20204297-xss (176474)" - } - ] - }, - "data_format" : "MITRE", - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4297", - "DATE_PUBLIC" : "2020-06-18T00:00:00" - }, - "impact" : { - "cvssv3" : { - "BM" : { - "C" : "L", - "AV" : "N", - "UI" : "R", - "PR" : "L", - "I" : "L", - "AC" : "L", - "SCORE" : "5.400", - "S" : "C", - "A" : "N" - }, - "TM" : { - "RL" : "O", - "E" : "H", - "RC" : "C" - } - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176474." - } - ] - }, - "data_version" : "4.0", - "data_type" : "CVE" -} + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6235162", + "name": "https://www.ibm.com/support/pages/node/6235162", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6235162 (Rational DOORS Next Generation)" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/176474", + "refsource": "XF", + "name": "ibm-dng-cve20204297-xss (176474)" + } + ] + }, + "data_format": "MITRE", + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4297", + "DATE_PUBLIC": "2020-06-18T00:00:00" + }, + "impact": { + "cvssv3": { + "BM": { + "C": "L", + "AV": "N", + "UI": "R", + "PR": "L", + "I": "L", + "AC": "L", + "SCORE": "5.400", + "S": "C", + "A": "N" + }, + "TM": { + "RL": "O", + "E": "H", + "RC": "C" + } + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176474." + } + ] + }, + "data_version": "4.0", + "data_type": "CVE" +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8184.json b/2020/8xxx/CVE-2020-8184.json index a463f373c91..740067238d7 100644 --- a/2020/8xxx/CVE-2020-8184.json +++ b/2020/8xxx/CVE-2020-8184.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8184", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "https://github.com/rack/rack", + "version": { + "version_data": [ + { + "version_value": "rack >= 2.2.3, rack >= 2.1.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reliance on Cookies without Validation and Integrity Checking in a Security Decision (CWE-784)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/895727", + "url": "https://hackerone.com/reports/895727" + }, + { + "refsource": "MISC", + "name": "https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak", + "url": "https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix." } ] }