From 3447d79099be6cf9b407c82e51aa8b73bada79d3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 21 Apr 2020 15:01:25 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/18xxx/CVE-2017-18810.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18811.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18812.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18813.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18814.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18815.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18816.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18819.json | 70 +++++++++++++++++++++++++++++++--- 2017/18xxx/CVE-2017-18820.json | 70 +++++++++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8960.json | 4 +- 2019/8xxx/CVE-2019-8961.json | 4 +- 2020/11xxx/CVE-2020-11999.json | 18 +++++++++ 2020/12xxx/CVE-2020-12000.json | 18 +++++++++ 2020/12xxx/CVE-2020-12001.json | 18 +++++++++ 2020/12xxx/CVE-2020-12002.json | 18 +++++++++ 2020/12xxx/CVE-2020-12003.json | 18 +++++++++ 2020/12xxx/CVE-2020-12004.json | 18 +++++++++ 2020/12xxx/CVE-2020-12005.json | 18 +++++++++ 2020/12xxx/CVE-2020-12006.json | 18 +++++++++ 2020/12xxx/CVE-2020-12007.json | 18 +++++++++ 2020/12xxx/CVE-2020-12008.json | 18 +++++++++ 2020/12xxx/CVE-2020-12009.json | 18 +++++++++ 2020/12xxx/CVE-2020-12010.json | 18 +++++++++ 2020/12xxx/CVE-2020-12011.json | 18 +++++++++ 2020/12xxx/CVE-2020-12012.json | 18 +++++++++ 2020/12xxx/CVE-2020-12013.json | 18 +++++++++ 2020/12xxx/CVE-2020-12014.json | 18 +++++++++ 2020/12xxx/CVE-2020-12015.json | 18 +++++++++ 2020/12xxx/CVE-2020-12016.json | 18 +++++++++ 2020/12xxx/CVE-2020-12017.json | 18 +++++++++ 2020/12xxx/CVE-2020-12018.json | 18 +++++++++ 2020/12xxx/CVE-2020-12019.json | 18 +++++++++ 2020/12xxx/CVE-2020-12020.json | 18 +++++++++ 2020/12xxx/CVE-2020-12021.json | 18 +++++++++ 2020/12xxx/CVE-2020-12022.json | 18 +++++++++ 2020/12xxx/CVE-2020-12023.json | 18 +++++++++ 2020/12xxx/CVE-2020-12024.json | 18 +++++++++ 2020/12xxx/CVE-2020-12025.json | 18 +++++++++ 2020/12xxx/CVE-2020-12026.json | 18 +++++++++ 2020/12xxx/CVE-2020-12027.json | 18 +++++++++ 2020/12xxx/CVE-2020-12028.json | 18 +++++++++ 2020/12xxx/CVE-2020-12029.json | 18 +++++++++ 2020/12xxx/CVE-2020-12030.json | 18 +++++++++ 2020/12xxx/CVE-2020-12031.json | 18 +++++++++ 2020/12xxx/CVE-2020-12032.json | 18 +++++++++ 2020/12xxx/CVE-2020-12033.json | 18 +++++++++ 2020/12xxx/CVE-2020-12034.json | 18 +++++++++ 2020/12xxx/CVE-2020-12035.json | 18 +++++++++ 2020/12xxx/CVE-2020-12036.json | 18 +++++++++ 2020/12xxx/CVE-2020-12037.json | 18 +++++++++ 2020/12xxx/CVE-2020-12038.json | 18 +++++++++ 2020/12xxx/CVE-2020-12039.json | 18 +++++++++ 2020/12xxx/CVE-2020-12040.json | 18 +++++++++ 2020/12xxx/CVE-2020-12041.json | 18 +++++++++ 2020/12xxx/CVE-2020-12042.json | 18 +++++++++ 2020/12xxx/CVE-2020-12043.json | 18 +++++++++ 2020/12xxx/CVE-2020-12044.json | 18 +++++++++ 2020/12xxx/CVE-2020-12045.json | 18 +++++++++ 2020/12xxx/CVE-2020-12046.json | 18 +++++++++ 2020/12xxx/CVE-2020-12047.json | 18 +++++++++ 2020/12xxx/CVE-2020-12048.json | 18 +++++++++ 2020/8xxx/CVE-2020-8428.json | 5 +++ 2020/8xxx/CVE-2020-8992.json | 5 +++ 63 files changed, 1490 insertions(+), 58 deletions(-) create mode 100644 2020/11xxx/CVE-2020-11999.json create mode 100644 2020/12xxx/CVE-2020-12000.json create mode 100644 2020/12xxx/CVE-2020-12001.json create mode 100644 2020/12xxx/CVE-2020-12002.json create mode 100644 2020/12xxx/CVE-2020-12003.json create mode 100644 2020/12xxx/CVE-2020-12004.json create mode 100644 2020/12xxx/CVE-2020-12005.json create mode 100644 2020/12xxx/CVE-2020-12006.json create mode 100644 2020/12xxx/CVE-2020-12007.json create mode 100644 2020/12xxx/CVE-2020-12008.json create mode 100644 2020/12xxx/CVE-2020-12009.json create mode 100644 2020/12xxx/CVE-2020-12010.json create mode 100644 2020/12xxx/CVE-2020-12011.json create mode 100644 2020/12xxx/CVE-2020-12012.json create mode 100644 2020/12xxx/CVE-2020-12013.json create mode 100644 2020/12xxx/CVE-2020-12014.json create mode 100644 2020/12xxx/CVE-2020-12015.json create mode 100644 2020/12xxx/CVE-2020-12016.json create mode 100644 2020/12xxx/CVE-2020-12017.json create mode 100644 2020/12xxx/CVE-2020-12018.json create mode 100644 2020/12xxx/CVE-2020-12019.json create mode 100644 2020/12xxx/CVE-2020-12020.json create mode 100644 2020/12xxx/CVE-2020-12021.json create mode 100644 2020/12xxx/CVE-2020-12022.json create mode 100644 2020/12xxx/CVE-2020-12023.json create mode 100644 2020/12xxx/CVE-2020-12024.json create mode 100644 2020/12xxx/CVE-2020-12025.json create mode 100644 2020/12xxx/CVE-2020-12026.json create mode 100644 2020/12xxx/CVE-2020-12027.json create mode 100644 2020/12xxx/CVE-2020-12028.json create mode 100644 2020/12xxx/CVE-2020-12029.json create mode 100644 2020/12xxx/CVE-2020-12030.json create mode 100644 2020/12xxx/CVE-2020-12031.json create mode 100644 2020/12xxx/CVE-2020-12032.json create mode 100644 2020/12xxx/CVE-2020-12033.json create mode 100644 2020/12xxx/CVE-2020-12034.json create mode 100644 2020/12xxx/CVE-2020-12035.json create mode 100644 2020/12xxx/CVE-2020-12036.json create mode 100644 2020/12xxx/CVE-2020-12037.json create mode 100644 2020/12xxx/CVE-2020-12038.json create mode 100644 2020/12xxx/CVE-2020-12039.json create mode 100644 2020/12xxx/CVE-2020-12040.json create mode 100644 2020/12xxx/CVE-2020-12041.json create mode 100644 2020/12xxx/CVE-2020-12042.json create mode 100644 2020/12xxx/CVE-2020-12043.json create mode 100644 2020/12xxx/CVE-2020-12044.json create mode 100644 2020/12xxx/CVE-2020-12045.json create mode 100644 2020/12xxx/CVE-2020-12046.json create mode 100644 2020/12xxx/CVE-2020-12047.json create mode 100644 2020/12xxx/CVE-2020-12048.json diff --git a/2017/18xxx/CVE-2017-18810.json b/2017/18xxx/CVE-2017-18810.json index 5758d14bae5..f5e17ba55cb 100644 --- a/2017/18xxx/CVE-2017-18810.json +++ b/2017/18xxx/CVE-2017-18810.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18810", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18810", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049055/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0300", + "url": "https://kb.netgear.com/000049055/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0300" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18811.json b/2017/18xxx/CVE-2017-18811.json index 7f47eda0057..2972a99e404 100644 --- a/2017/18xxx/CVE-2017-18811.json +++ b/2017/18xxx/CVE-2017-18811.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18811", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18811", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049054/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0299", + "url": "https://kb.netgear.com/000049054/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0299" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18812.json b/2017/18xxx/CVE-2017-18812.json index 082c1b9d143..cbbaf7f0da9 100644 --- a/2017/18xxx/CVE-2017-18812.json +++ b/2017/18xxx/CVE-2017-18812.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18812", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18812", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049053/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0298", + "url": "https://kb.netgear.com/000049053/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0298" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18813.json b/2017/18xxx/CVE-2017-18813.json index cc7c78b255f..5069a287b6c 100644 --- a/2017/18xxx/CVE-2017-18813.json +++ b/2017/18xxx/CVE-2017-18813.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18813", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18813", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049052/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0296", + "url": "https://kb.netgear.com/000049052/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0296" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18814.json b/2017/18xxx/CVE-2017-18814.json index 32c689bddb2..da77829a33b 100644 --- a/2017/18xxx/CVE-2017-18814.json +++ b/2017/18xxx/CVE-2017-18814.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18814", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18814", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049051/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0295", + "url": "https://kb.netgear.com/000049051/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0295" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18815.json b/2017/18xxx/CVE-2017-18815.json index d707df024e4..d354387f54a 100644 --- a/2017/18xxx/CVE-2017-18815.json +++ b/2017/18xxx/CVE-2017-18815.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18815", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18815", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices, running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049050/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0291", + "url": "https://kb.netgear.com/000049050/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0291" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18816.json b/2017/18xxx/CVE-2017-18816.json index 018e7eea8eb..8817c71cf2a 100644 --- a/2017/18xxx/CVE-2017-18816.json +++ b/2017/18xxx/CVE-2017-18816.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18816", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18816", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices, running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049049/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0290", + "url": "https://kb.netgear.com/000049049/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0290" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18819.json b/2017/18xxx/CVE-2017-18819.json index d9be429ff3d..0650b903198 100644 --- a/2017/18xxx/CVE-2017-18819.json +++ b/2017/18xxx/CVE-2017-18819.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18819", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18819", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices, running ReadyNAS OS versions prior to 6.8.0 are affected by incorrect configuration of security settings." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049046/Security-Advisory-for-Security-Misconfiguration-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0289", + "url": "https://kb.netgear.com/000049046/Security-Advisory-for-Security-Misconfiguration-Vulnerability-on-Some-ReadyNAS-devices-PSV-2017-0289" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:N/C:L/I:N/PR:N/S:U/UI:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18820.json b/2017/18xxx/CVE-2017-18820.json index df3ee21b4de..c8c1b7504d7 100644 --- a/2017/18xxx/CVE-2017-18820.json +++ b/2017/18xxx/CVE-2017-18820.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2017-18820", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2017-18820", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR ReadyNAS OS 6 devices running ReadyNAS OS versions prior to 6.8.0 are affected by stored XSS." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://kb.netgear.com/000049045/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-ReadyNAS-devices-PSV-2017-0266", + "url": "https://kb.netgear.com/000049045/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-ReadyNAS-devices-PSV-2017-0266" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AC:L/AV:L/A:L/C:L/I:L/PR:H/S:C/UI:R", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/8xxx/CVE-2019-8960.json b/2019/8xxx/CVE-2019-8960.json index 62821a000b0..cfb41b28756 100644 --- a/2019/8xxx/CVE-2019-8960.json +++ b/2019/8xxx/CVE-2019-8960.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "PSIRT-CNA@flexera.com", + "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2019-8960", "STATE": "PUBLIC" }, @@ -59,4 +59,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2019/8xxx/CVE-2019-8961.json b/2019/8xxx/CVE-2019-8961.json index 8d40ed635bd..ccf16ca3c13 100644 --- a/2019/8xxx/CVE-2019-8961.json +++ b/2019/8xxx/CVE-2019-8961.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "PSIRT-CNA@flexera.com", + "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2019-8961", "STATE": "PUBLIC" }, @@ -59,4 +59,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11999.json b/2020/11xxx/CVE-2020-11999.json new file mode 100644 index 00000000000..0967f9d019b --- /dev/null +++ b/2020/11xxx/CVE-2020-11999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-11999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12000.json b/2020/12xxx/CVE-2020-12000.json new file mode 100644 index 00000000000..d0fa86646ad --- /dev/null +++ b/2020/12xxx/CVE-2020-12000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12001.json b/2020/12xxx/CVE-2020-12001.json new file mode 100644 index 00000000000..0c995b377ca --- /dev/null +++ b/2020/12xxx/CVE-2020-12001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12002.json b/2020/12xxx/CVE-2020-12002.json new file mode 100644 index 00000000000..5e959bc530a --- /dev/null +++ b/2020/12xxx/CVE-2020-12002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12003.json b/2020/12xxx/CVE-2020-12003.json new file mode 100644 index 00000000000..8235281e9cd --- /dev/null +++ b/2020/12xxx/CVE-2020-12003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12004.json b/2020/12xxx/CVE-2020-12004.json new file mode 100644 index 00000000000..a94cbaf499a --- /dev/null +++ b/2020/12xxx/CVE-2020-12004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12005.json b/2020/12xxx/CVE-2020-12005.json new file mode 100644 index 00000000000..a62d8408aeb --- /dev/null +++ b/2020/12xxx/CVE-2020-12005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12006.json b/2020/12xxx/CVE-2020-12006.json new file mode 100644 index 00000000000..1ed164619f5 --- /dev/null +++ b/2020/12xxx/CVE-2020-12006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12007.json b/2020/12xxx/CVE-2020-12007.json new file mode 100644 index 00000000000..b2ec482aa9b --- /dev/null +++ b/2020/12xxx/CVE-2020-12007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12008.json b/2020/12xxx/CVE-2020-12008.json new file mode 100644 index 00000000000..faddc0c551d --- /dev/null +++ b/2020/12xxx/CVE-2020-12008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12009.json b/2020/12xxx/CVE-2020-12009.json new file mode 100644 index 00000000000..1a0a679e00e --- /dev/null +++ b/2020/12xxx/CVE-2020-12009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12010.json b/2020/12xxx/CVE-2020-12010.json new file mode 100644 index 00000000000..5398c5c0e0a --- /dev/null +++ b/2020/12xxx/CVE-2020-12010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12011.json b/2020/12xxx/CVE-2020-12011.json new file mode 100644 index 00000000000..9b8dc77b587 --- /dev/null +++ b/2020/12xxx/CVE-2020-12011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12012.json b/2020/12xxx/CVE-2020-12012.json new file mode 100644 index 00000000000..27c8b8cfccd --- /dev/null +++ b/2020/12xxx/CVE-2020-12012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12013.json b/2020/12xxx/CVE-2020-12013.json new file mode 100644 index 00000000000..8684923f5b0 --- /dev/null +++ b/2020/12xxx/CVE-2020-12013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12014.json b/2020/12xxx/CVE-2020-12014.json new file mode 100644 index 00000000000..195514d572f --- /dev/null +++ b/2020/12xxx/CVE-2020-12014.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12014", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12015.json b/2020/12xxx/CVE-2020-12015.json new file mode 100644 index 00000000000..d49bf2eb043 --- /dev/null +++ b/2020/12xxx/CVE-2020-12015.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12015", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12016.json b/2020/12xxx/CVE-2020-12016.json new file mode 100644 index 00000000000..8ca9ed9d53b --- /dev/null +++ b/2020/12xxx/CVE-2020-12016.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12016", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12017.json b/2020/12xxx/CVE-2020-12017.json new file mode 100644 index 00000000000..31bd69eb131 --- /dev/null +++ b/2020/12xxx/CVE-2020-12017.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12017", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12018.json b/2020/12xxx/CVE-2020-12018.json new file mode 100644 index 00000000000..3b1d8b434d6 --- /dev/null +++ b/2020/12xxx/CVE-2020-12018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12019.json b/2020/12xxx/CVE-2020-12019.json new file mode 100644 index 00000000000..3d73139db33 --- /dev/null +++ b/2020/12xxx/CVE-2020-12019.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12019", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12020.json b/2020/12xxx/CVE-2020-12020.json new file mode 100644 index 00000000000..4726658ef29 --- /dev/null +++ b/2020/12xxx/CVE-2020-12020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12021.json b/2020/12xxx/CVE-2020-12021.json new file mode 100644 index 00000000000..e1628bfa3ba --- /dev/null +++ b/2020/12xxx/CVE-2020-12021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12022.json b/2020/12xxx/CVE-2020-12022.json new file mode 100644 index 00000000000..8825e421b58 --- /dev/null +++ b/2020/12xxx/CVE-2020-12022.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12022", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12023.json b/2020/12xxx/CVE-2020-12023.json new file mode 100644 index 00000000000..370a181b83c --- /dev/null +++ b/2020/12xxx/CVE-2020-12023.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12023", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12024.json b/2020/12xxx/CVE-2020-12024.json new file mode 100644 index 00000000000..5d216e5e57b --- /dev/null +++ b/2020/12xxx/CVE-2020-12024.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12024", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12025.json b/2020/12xxx/CVE-2020-12025.json new file mode 100644 index 00000000000..e2f3e1850d7 --- /dev/null +++ b/2020/12xxx/CVE-2020-12025.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12025", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12026.json b/2020/12xxx/CVE-2020-12026.json new file mode 100644 index 00000000000..4520224e78a --- /dev/null +++ b/2020/12xxx/CVE-2020-12026.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12026", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12027.json b/2020/12xxx/CVE-2020-12027.json new file mode 100644 index 00000000000..ede6183f05e --- /dev/null +++ b/2020/12xxx/CVE-2020-12027.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12027", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12028.json b/2020/12xxx/CVE-2020-12028.json new file mode 100644 index 00000000000..75930329f77 --- /dev/null +++ b/2020/12xxx/CVE-2020-12028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12029.json b/2020/12xxx/CVE-2020-12029.json new file mode 100644 index 00000000000..9feae3d5753 --- /dev/null +++ b/2020/12xxx/CVE-2020-12029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12030.json b/2020/12xxx/CVE-2020-12030.json new file mode 100644 index 00000000000..263ded7e9ed --- /dev/null +++ b/2020/12xxx/CVE-2020-12030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12031.json b/2020/12xxx/CVE-2020-12031.json new file mode 100644 index 00000000000..75f5782f06b --- /dev/null +++ b/2020/12xxx/CVE-2020-12031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12032.json b/2020/12xxx/CVE-2020-12032.json new file mode 100644 index 00000000000..05a37514a57 --- /dev/null +++ b/2020/12xxx/CVE-2020-12032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12033.json b/2020/12xxx/CVE-2020-12033.json new file mode 100644 index 00000000000..b056dbbe0c2 --- /dev/null +++ b/2020/12xxx/CVE-2020-12033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12034.json b/2020/12xxx/CVE-2020-12034.json new file mode 100644 index 00000000000..3ef15f86db8 --- /dev/null +++ b/2020/12xxx/CVE-2020-12034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12035.json b/2020/12xxx/CVE-2020-12035.json new file mode 100644 index 00000000000..76efbd3f9e9 --- /dev/null +++ b/2020/12xxx/CVE-2020-12035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12036.json b/2020/12xxx/CVE-2020-12036.json new file mode 100644 index 00000000000..05c753e3aca --- /dev/null +++ b/2020/12xxx/CVE-2020-12036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12037.json b/2020/12xxx/CVE-2020-12037.json new file mode 100644 index 00000000000..6f2f397a829 --- /dev/null +++ b/2020/12xxx/CVE-2020-12037.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12037", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12038.json b/2020/12xxx/CVE-2020-12038.json new file mode 100644 index 00000000000..e9e88d47348 --- /dev/null +++ b/2020/12xxx/CVE-2020-12038.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12038", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12039.json b/2020/12xxx/CVE-2020-12039.json new file mode 100644 index 00000000000..e08a4efb2b1 --- /dev/null +++ b/2020/12xxx/CVE-2020-12039.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12039", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12040.json b/2020/12xxx/CVE-2020-12040.json new file mode 100644 index 00000000000..c0464383de0 --- /dev/null +++ b/2020/12xxx/CVE-2020-12040.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12040", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12041.json b/2020/12xxx/CVE-2020-12041.json new file mode 100644 index 00000000000..2035d8c3a17 --- /dev/null +++ b/2020/12xxx/CVE-2020-12041.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12041", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12042.json b/2020/12xxx/CVE-2020-12042.json new file mode 100644 index 00000000000..abd5f889977 --- /dev/null +++ b/2020/12xxx/CVE-2020-12042.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12042", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12043.json b/2020/12xxx/CVE-2020-12043.json new file mode 100644 index 00000000000..2063ac5c416 --- /dev/null +++ b/2020/12xxx/CVE-2020-12043.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12043", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12044.json b/2020/12xxx/CVE-2020-12044.json new file mode 100644 index 00000000000..36eac211bf5 --- /dev/null +++ b/2020/12xxx/CVE-2020-12044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12045.json b/2020/12xxx/CVE-2020-12045.json new file mode 100644 index 00000000000..f63eb2b7023 --- /dev/null +++ b/2020/12xxx/CVE-2020-12045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12046.json b/2020/12xxx/CVE-2020-12046.json new file mode 100644 index 00000000000..c166caf3b98 --- /dev/null +++ b/2020/12xxx/CVE-2020-12046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12047.json b/2020/12xxx/CVE-2020-12047.json new file mode 100644 index 00000000000..14ccb0991a4 --- /dev/null +++ b/2020/12xxx/CVE-2020-12047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12048.json b/2020/12xxx/CVE-2020-12048.json new file mode 100644 index 00000000000..71adf1619aa --- /dev/null +++ b/2020/12xxx/CVE-2020-12048.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12048", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8428.json b/2020/8xxx/CVE-2020-8428.json index a9f2766c59d..1a3738b3b24 100644 --- a/2020/8xxx/CVE-2020-8428.json +++ b/2020/8xxx/CVE-2020-8428.json @@ -101,6 +101,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4324-1", + "url": "https://usn.ubuntu.com/4324-1/" } ] }, diff --git a/2020/8xxx/CVE-2020-8992.json b/2020/8xxx/CVE-2020-8992.json index ac320c6327e..7451f1dec5c 100644 --- a/2020/8xxx/CVE-2020-8992.json +++ b/2020/8xxx/CVE-2020-8992.json @@ -71,6 +71,11 @@ "refsource": "UBUNTU", "name": "USN-4318-1", "url": "https://usn.ubuntu.com/4318-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4324-1", + "url": "https://usn.ubuntu.com/4324-1/" } ] }