diff --git a/2018/12xxx/CVE-2018-12767.json b/2018/12xxx/CVE-2018-12767.json index 603616b8a6d..5ac9bb789f1 100644 --- a/2018/12xxx/CVE-2018-12767.json +++ b/2018/12xxx/CVE-2018-12767.json @@ -66,6 +66,11 @@ "name": "1041250", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041250" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12768.json b/2018/12xxx/CVE-2018-12768.json index f90da77055e..676275add4e 100644 --- a/2018/12xxx/CVE-2018-12768.json +++ b/2018/12xxx/CVE-2018-12768.json @@ -66,6 +66,11 @@ "name": "1041250", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041250" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12857.json b/2018/12xxx/CVE-2018-12857.json index 3273bbee643..3b7a1947cc3 100644 --- a/2018/12xxx/CVE-2018-12857.json +++ b/2018/12xxx/CVE-2018-12857.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12859.json b/2018/12xxx/CVE-2018-12859.json index bdbd76d0a4f..b467fd7825a 100644 --- a/2018/12xxx/CVE-2018-12859.json +++ b/2018/12xxx/CVE-2018-12859.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12860.json b/2018/12xxx/CVE-2018-12860.json index 8c436186bc2..d7e3fbe23f8 100644 --- a/2018/12xxx/CVE-2018-12860.json +++ b/2018/12xxx/CVE-2018-12860.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12861.json b/2018/12xxx/CVE-2018-12861.json index 50a838b4911..641bc2f6d75 100644 --- a/2018/12xxx/CVE-2018-12861.json +++ b/2018/12xxx/CVE-2018-12861.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12862.json b/2018/12xxx/CVE-2018-12862.json index f0970c16c22..99a74b86798 100644 --- a/2018/12xxx/CVE-2018-12862.json +++ b/2018/12xxx/CVE-2018-12862.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12863.json b/2018/12xxx/CVE-2018-12863.json index e6dc89b12e5..be45b8cace0 100644 --- a/2018/12xxx/CVE-2018-12863.json +++ b/2018/12xxx/CVE-2018-12863.json @@ -66,6 +66,11 @@ "name": "105441", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105441" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12864.json b/2018/12xxx/CVE-2018-12864.json index fe0d2df8e23..eae5331d377 100644 --- a/2018/12xxx/CVE-2018-12864.json +++ b/2018/12xxx/CVE-2018-12864.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12865.json b/2018/12xxx/CVE-2018-12865.json index b5fe3fed105..d29353a07f8 100644 --- a/2018/12xxx/CVE-2018-12865.json +++ b/2018/12xxx/CVE-2018-12865.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12866.json b/2018/12xxx/CVE-2018-12866.json index f933f2f9a9f..62fd7e3ac82 100644 --- a/2018/12xxx/CVE-2018-12866.json +++ b/2018/12xxx/CVE-2018-12866.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12867.json b/2018/12xxx/CVE-2018-12867.json index 4048739a870..cf72299b82d 100644 --- a/2018/12xxx/CVE-2018-12867.json +++ b/2018/12xxx/CVE-2018-12867.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12869.json b/2018/12xxx/CVE-2018-12869.json index 6accd9473cd..71ed4d9d101 100644 --- a/2018/12xxx/CVE-2018-12869.json +++ b/2018/12xxx/CVE-2018-12869.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12870.json b/2018/12xxx/CVE-2018-12870.json index d4467cc2b4d..fe2b5aeab24 100644 --- a/2018/12xxx/CVE-2018-12870.json +++ b/2018/12xxx/CVE-2018-12870.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12871.json b/2018/12xxx/CVE-2018-12871.json index 2923a2d3ae7..48df31c4633 100644 --- a/2018/12xxx/CVE-2018-12871.json +++ b/2018/12xxx/CVE-2018-12871.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12872.json b/2018/12xxx/CVE-2018-12872.json index 3a299cf9df8..cb179c28961 100644 --- a/2018/12xxx/CVE-2018-12872.json +++ b/2018/12xxx/CVE-2018-12872.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12873.json b/2018/12xxx/CVE-2018-12873.json index 32632b18f4e..9c404b34bf6 100644 --- a/2018/12xxx/CVE-2018-12873.json +++ b/2018/12xxx/CVE-2018-12873.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12874.json b/2018/12xxx/CVE-2018-12874.json index 366f1b9edcb..7769a34af9c 100644 --- a/2018/12xxx/CVE-2018-12874.json +++ b/2018/12xxx/CVE-2018-12874.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/12xxx/CVE-2018-12875.json b/2018/12xxx/CVE-2018-12875.json index dffa5bf8f01..0e8d35387f3 100644 --- a/2018/12xxx/CVE-2018-12875.json +++ b/2018/12xxx/CVE-2018-12875.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15927.json b/2018/15xxx/CVE-2018-15927.json index cb3d3cd7819..78dde4c9c12 100644 --- a/2018/15xxx/CVE-2018-15927.json +++ b/2018/15xxx/CVE-2018-15927.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15928.json b/2018/15xxx/CVE-2018-15928.json index cfeb07b40a6..d600f61f9b6 100644 --- a/2018/15xxx/CVE-2018-15928.json +++ b/2018/15xxx/CVE-2018-15928.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15929.json b/2018/15xxx/CVE-2018-15929.json index 783af422e8f..40f662484f7 100644 --- a/2018/15xxx/CVE-2018-15929.json +++ b/2018/15xxx/CVE-2018-15929.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15930.json b/2018/15xxx/CVE-2018-15930.json index 9d1f78553f9..6c8b0d59c13 100644 --- a/2018/15xxx/CVE-2018-15930.json +++ b/2018/15xxx/CVE-2018-15930.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15931.json b/2018/15xxx/CVE-2018-15931.json index 6961b9a9a26..2d1d5a112ad 100644 --- a/2018/15xxx/CVE-2018-15931.json +++ b/2018/15xxx/CVE-2018-15931.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15932.json b/2018/15xxx/CVE-2018-15932.json index 04fb11d2f63..454c805c679 100644 --- a/2018/15xxx/CVE-2018-15932.json +++ b/2018/15xxx/CVE-2018-15932.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15933.json b/2018/15xxx/CVE-2018-15933.json index 8fa37994fee..8f9f0e8a48c 100644 --- a/2018/15xxx/CVE-2018-15933.json +++ b/2018/15xxx/CVE-2018-15933.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15934.json b/2018/15xxx/CVE-2018-15934.json index bf71ec551d0..1473e60029b 100644 --- a/2018/15xxx/CVE-2018-15934.json +++ b/2018/15xxx/CVE-2018-15934.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15935.json b/2018/15xxx/CVE-2018-15935.json index 6ec4243abd6..accde2c09ed 100644 --- a/2018/15xxx/CVE-2018-15935.json +++ b/2018/15xxx/CVE-2018-15935.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15936.json b/2018/15xxx/CVE-2018-15936.json index 56775e6b987..be9b4511d4f 100644 --- a/2018/15xxx/CVE-2018-15936.json +++ b/2018/15xxx/CVE-2018-15936.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15937.json b/2018/15xxx/CVE-2018-15937.json index b265fa4180c..572aa5f1664 100644 --- a/2018/15xxx/CVE-2018-15937.json +++ b/2018/15xxx/CVE-2018-15937.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15938.json b/2018/15xxx/CVE-2018-15938.json index a3161107bb1..a6838b0714d 100644 --- a/2018/15xxx/CVE-2018-15938.json +++ b/2018/15xxx/CVE-2018-15938.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15952.json b/2018/15xxx/CVE-2018-15952.json index 5330c69a1aa..d9f49e2dbd2 100644 --- a/2018/15xxx/CVE-2018-15952.json +++ b/2018/15xxx/CVE-2018-15952.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15953.json b/2018/15xxx/CVE-2018-15953.json index e565fbfbc3c..2c84425af0b 100644 --- a/2018/15xxx/CVE-2018-15953.json +++ b/2018/15xxx/CVE-2018-15953.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15954.json b/2018/15xxx/CVE-2018-15954.json index cd9c6fb8063..74a386d7f07 100644 --- a/2018/15xxx/CVE-2018-15954.json +++ b/2018/15xxx/CVE-2018-15954.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15955.json b/2018/15xxx/CVE-2018-15955.json index b7c88352c04..695484baeb3 100644 --- a/2018/15xxx/CVE-2018-15955.json +++ b/2018/15xxx/CVE-2018-15955.json @@ -66,6 +66,11 @@ "name": "105432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105432" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2018/15xxx/CVE-2018-15956.json b/2018/15xxx/CVE-2018-15956.json index 07b3dc20e40..a5c44284caf 100644 --- a/2018/15xxx/CVE-2018-15956.json +++ b/2018/15xxx/CVE-2018-15956.json @@ -66,6 +66,11 @@ "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/", + "url": "https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/" } ] } diff --git a/2019/20xxx/CVE-2019-20482.json b/2019/20xxx/CVE-2019-20482.json new file mode 100644 index 00000000000..a6171868fb7 --- /dev/null +++ b/2019/20xxx/CVE-2019-20482.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20482", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/1xxx/CVE-2020-1937.json b/2020/1xxx/CVE-2020-1937.json index b1e529f44fc..51b2723bd16 100644 --- a/2020/1xxx/CVE-2020-1937.json +++ b/2020/1xxx/CVE-2020-1937.json @@ -4,14 +4,79 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1937", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apache", + "product": { + "product_data": [ + { + "product_name": "Apache Kylin", + "version": { + "version_data": [ + { + "version_value": "ApacheKylin 2.3.0 to 2.3.2" + }, + { + "version_value": "2.4.0 to 2.4.1" + }, + { + "version_value": "2.5.0 to 2.5.2" + }, + { + "version_value": "2.6.0 to 2.6.4" + }, + { + "version_value": "3.0.0-alpha" + }, + { + "version_value": "3.0.0-alpha2" + }, + { + "version_value": "3.0.0-beta" + }, + { + "version_value": "3.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MLIST", + "name": "[kylin-user] 20200223 [CVE-2020-1937] Apache Kylin SQL injection vulnerability", + "url": "https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25f3f54be143a80a8%40%3Cuser.kylin.apache.org%3E" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries." } ] } diff --git a/2020/9xxx/CVE-2020-9378.json b/2020/9xxx/CVE-2020-9378.json new file mode 100644 index 00000000000..e51808e6a42 --- /dev/null +++ b/2020/9xxx/CVE-2020-9378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9379.json b/2020/9xxx/CVE-2020-9379.json new file mode 100644 index 00000000000..120ae30232b --- /dev/null +++ b/2020/9xxx/CVE-2020-9379.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9379", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9380.json b/2020/9xxx/CVE-2020-9380.json new file mode 100644 index 00000000000..c5fbc85ae07 --- /dev/null +++ b/2020/9xxx/CVE-2020-9380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file