diff --git a/2018/1000xxx/CVE-2018-1000888.json b/2018/1000xxx/CVE-2018-1000888.json index 84f73664e4e..370c262e593 100644 --- a/2018/1000xxx/CVE-2018-1000888.json +++ b/2018/1000xxx/CVE-2018-1000888.json @@ -94,6 +94,11 @@ "name": "https://pear.php.net/bugs/bug.php?id=23782", "refsource": "CONFIRM", "url": "https://pear.php.net/bugs/bug.php?id=23782" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-14", + "url": "https://security.gentoo.org/glsa/202006-14" } ] } diff --git a/2018/19xxx/CVE-2018-19502.json b/2018/19xxx/CVE-2018-19502.json index 1a7fff9c3d8..695891c7803 100644 --- a/2018/19xxx/CVE-2018-19502.json +++ b/2018/19xxx/CVE-2018-19502.json @@ -76,6 +76,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/19xxx/CVE-2018-19503.json b/2018/19xxx/CVE-2018-19503.json index 6fc1e72676a..6b77b3271e1 100644 --- a/2018/19xxx/CVE-2018-19503.json +++ b/2018/19xxx/CVE-2018-19503.json @@ -71,6 +71,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/19xxx/CVE-2018-19504.json b/2018/19xxx/CVE-2018-19504.json index a143f4c66c0..81b5a0e22f7 100644 --- a/2018/19xxx/CVE-2018-19504.json +++ b/2018/19xxx/CVE-2018-19504.json @@ -71,6 +71,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20194.json b/2018/20xxx/CVE-2018-20194.json index d465ca83168..89af58f88bf 100644 --- a/2018/20xxx/CVE-2018-20194.json +++ b/2018/20xxx/CVE-2018-20194.json @@ -71,6 +71,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20195.json b/2018/20xxx/CVE-2018-20195.json index e0f73ae8515..ccc8b9fda6b 100644 --- a/2018/20xxx/CVE-2018-20195.json +++ b/2018/20xxx/CVE-2018-20195.json @@ -66,6 +66,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20196.json b/2018/20xxx/CVE-2018-20196.json index 3df11bafa72..317a700115d 100644 --- a/2018/20xxx/CVE-2018-20196.json +++ b/2018/20xxx/CVE-2018-20196.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20197.json b/2018/20xxx/CVE-2018-20197.json index 051307fe8ad..0835d80da01 100644 --- a/2018/20xxx/CVE-2018-20197.json +++ b/2018/20xxx/CVE-2018-20197.json @@ -71,6 +71,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20198.json b/2018/20xxx/CVE-2018-20198.json index 46febd6d3ee..63f39128f09 100644 --- a/2018/20xxx/CVE-2018-20198.json +++ b/2018/20xxx/CVE-2018-20198.json @@ -71,6 +71,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20199.json b/2018/20xxx/CVE-2018-20199.json index fa1fb85d4fe..528037077e0 100644 --- a/2018/20xxx/CVE-2018-20199.json +++ b/2018/20xxx/CVE-2018-20199.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20357.json b/2018/20xxx/CVE-2018-20357.json index 9bdb921f21b..0237cfb418f 100644 --- a/2018/20xxx/CVE-2018-20357.json +++ b/2018/20xxx/CVE-2018-20357.json @@ -66,6 +66,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20358.json b/2018/20xxx/CVE-2018-20358.json index 52680d3d21d..9740bd39702 100644 --- a/2018/20xxx/CVE-2018-20358.json +++ b/2018/20xxx/CVE-2018-20358.json @@ -66,6 +66,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20359.json b/2018/20xxx/CVE-2018-20359.json index 7f4c4f699c2..2a59cf4ebc4 100644 --- a/2018/20xxx/CVE-2018-20359.json +++ b/2018/20xxx/CVE-2018-20359.json @@ -66,6 +66,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20360.json b/2018/20xxx/CVE-2018-20360.json index 6235150d6ac..67831960977 100644 --- a/2018/20xxx/CVE-2018-20360.json +++ b/2018/20xxx/CVE-2018-20360.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20361.json b/2018/20xxx/CVE-2018-20361.json index b9e77e76ad4..bd6e0bf0492 100644 --- a/2018/20xxx/CVE-2018-20361.json +++ b/2018/20xxx/CVE-2018-20361.json @@ -66,6 +66,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2018/20xxx/CVE-2018-20362.json b/2018/20xxx/CVE-2018-20362.json index a57738826e5..965e9fafd0b 100644 --- a/2018/20xxx/CVE-2018-20362.json +++ b/2018/20xxx/CVE-2018-20362.json @@ -71,6 +71,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2019/12xxx/CVE-2019-12439.json b/2019/12xxx/CVE-2019-12439.json index 6586c81bfce..59f0459cc94 100644 --- a/2019/12xxx/CVE-2019-12439.json +++ b/2019/12xxx/CVE-2019-12439.json @@ -86,6 +86,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1833", "url": "https://access.redhat.com/errata/RHSA-2019:1833" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-18", + "url": "https://security.gentoo.org/glsa/202006-18" } ] }, diff --git a/2019/15xxx/CVE-2019-15296.json b/2019/15xxx/CVE-2019-15296.json index cd6da2fbbfe..bf9ed418fae 100644 --- a/2019/15xxx/CVE-2019-15296.json +++ b/2019/15xxx/CVE-2019-15296.json @@ -71,6 +71,11 @@ "refsource": "BUGTRAQ", "name": "20190916 [SECURITY] [DSA 4522-1] faad2 security update", "url": "https://seclists.org/bugtraq/2019/Sep/28" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2019/19xxx/CVE-2019-19783.json b/2019/19xxx/CVE-2019-19783.json index 17809455935..29f832fafbc 100644 --- a/2019/19xxx/CVE-2019-19783.json +++ b/2019/19xxx/CVE-2019-19783.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-ad23a4522d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IGOO5UGEBBDPN7B2YXLK7I7L3Y35EBA/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-23", + "url": "https://security.gentoo.org/glsa/202006-23" } ] } diff --git a/2019/20xxx/CVE-2019-20454.json b/2019/20xxx/CVE-2019-20454.json index 047160b2d4e..d58a367ebab 100644 --- a/2019/20xxx/CVE-2019-20454.json +++ b/2019/20xxx/CVE-2019-20454.json @@ -71,6 +71,11 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735494", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1735494" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-16", + "url": "https://security.gentoo.org/glsa/202006-16" } ] }, diff --git a/2019/6xxx/CVE-2019-6956.json b/2019/6xxx/CVE-2019-6956.json index 8b0ff402622..16bd6beadab 100644 --- a/2019/6xxx/CVE-2019-6956.json +++ b/2019/6xxx/CVE-2019-6956.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-17", + "url": "https://security.gentoo.org/glsa/202006-17" } ] } diff --git a/2020/0xxx/CVE-2020-0067.json b/2020/0xxx/CVE-2020-0067.json index 1bcaa6a1d33..b9b2ecd13c0 100644 --- a/2020/0xxx/CVE-2020-0067.json +++ b/2020/0xxx/CVE-2020-0067.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "http://android.googlesource.com/kernel/common/+/688078e7", "url": "http://android.googlesource.com/kernel/common/+/688078e7" + }, + { + "refsource": "UBUNTU", + "name": "USN-4388-1", + "url": "https://usn.ubuntu.com/4388-1/" } ] }, diff --git a/2020/0xxx/CVE-2020-0543.json b/2020/0xxx/CVE-2020-0543.json index f2feeadfe31..38fad47fd3e 100644 --- a/2020/0xxx/CVE-2020-0543.json +++ b/2020/0xxx/CVE-2020-0543.json @@ -53,6 +53,11 @@ "refsource": "UBUNTU", "name": "USN-4385-1", "url": "https://usn.ubuntu.com/4385-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4388-1", + "url": "https://usn.ubuntu.com/4388-1/" } ] }, diff --git a/2020/12xxx/CVE-2020-12105.json b/2020/12xxx/CVE-2020-12105.json index 511737ddf4a..032f53ea7b4 100644 --- a/2020/12xxx/CVE-2020-12105.json +++ b/2020/12xxx/CVE-2020-12105.json @@ -61,6 +61,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0694", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-15", + "url": "https://security.gentoo.org/glsa/202006-15" } ] } diff --git a/2020/12xxx/CVE-2020-12114.json b/2020/12xxx/CVE-2020-12114.json index 74dd90d3acf..836f14bc17d 100644 --- a/2020/12xxx/CVE-2020-12114.json +++ b/2020/12xxx/CVE-2020-12114.json @@ -91,6 +91,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0801", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4388-1", + "url": "https://usn.ubuntu.com/4388-1/" } ] } diff --git a/2020/12xxx/CVE-2020-12464.json b/2020/12xxx/CVE-2020-12464.json index dd71c0d1bfc..b98bf07b4bb 100644 --- a/2020/12xxx/CVE-2020-12464.json +++ b/2020/12xxx/CVE-2020-12464.json @@ -111,6 +111,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0801", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4388-1", + "url": "https://usn.ubuntu.com/4388-1/" } ] } diff --git a/2020/12xxx/CVE-2020-12659.json b/2020/12xxx/CVE-2020-12659.json index 7672ae444e6..6e1b4492887 100644 --- a/2020/12xxx/CVE-2020-12659.json +++ b/2020/12xxx/CVE-2020-12659.json @@ -81,6 +81,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0801", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4388-1", + "url": "https://usn.ubuntu.com/4388-1/" } ] } diff --git a/2020/12xxx/CVE-2020-12762.json b/2020/12xxx/CVE-2020-12762.json index d6bf9d3cf57..70ca902bed5 100644 --- a/2020/12xxx/CVE-2020-12762.json +++ b/2020/12xxx/CVE-2020-12762.json @@ -96,6 +96,11 @@ "refsource": "UBUNTU", "name": "USN-4360-4", "url": "https://usn.ubuntu.com/4360-4/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-13", + "url": "https://security.gentoo.org/glsa/202006-13" } ] } diff --git a/2020/12xxx/CVE-2020-12823.json b/2020/12xxx/CVE-2020-12823.json index ba4e30827ef..f550397a922 100644 --- a/2020/12xxx/CVE-2020-12823.json +++ b/2020/12xxx/CVE-2020-12823.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-bc22f06aa3", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-15", + "url": "https://security.gentoo.org/glsa/202006-15" } ] } diff --git a/2020/14xxx/CVE-2020-14147.json b/2020/14xxx/CVE-2020-14147.json index 3f1ebf30203..78d9f988bfd 100644 --- a/2020/14xxx/CVE-2020-14147.json +++ b/2020/14xxx/CVE-2020-14147.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14147", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14147", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/antirez/redis/pull/6875", + "refsource": "MISC", + "name": "https://github.com/antirez/redis/pull/6875" + }, + { + "url": "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571", + "refsource": "MISC", + "name": "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" } ] } diff --git a/2020/14xxx/CVE-2020-14148.json b/2020/14xxx/CVE-2020-14148.json index 4ff52ab8a0f..bc52a6161f1 100644 --- a/2020/14xxx/CVE-2020-14148.json +++ b/2020/14xxx/CVE-2020-14148.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14148", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14148", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ngircd/ngircd/issues/274", + "refsource": "MISC", + "name": "https://github.com/ngircd/ngircd/issues/274" + }, + { + "url": "https://github.com/ngircd/ngircd/issues/277", + "refsource": "MISC", + "name": "https://github.com/ngircd/ngircd/issues/277" + }, + { + "url": "https://github.com/ngircd/ngircd/pull/275", + "refsource": "MISC", + "name": "https://github.com/ngircd/ngircd/pull/275" + }, + { + "url": "https://github.com/ngircd/ngircd/pull/276", + "refsource": "MISC", + "name": "https://github.com/ngircd/ngircd/pull/276" + }, + { + "url": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2", + "refsource": "MISC", + "name": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2" } ] } diff --git a/2020/14xxx/CVE-2020-14149.json b/2020/14xxx/CVE-2020-14149.json index 1130a8c1141..2dfd85e3994 100644 --- a/2020/14xxx/CVE-2020-14149.json +++ b/2020/14xxx/CVE-2020-14149.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14149", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14149", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/troglobit/uftpd/issues/30", + "refsource": "MISC", + "name": "https://github.com/troglobit/uftpd/issues/30" + }, + { + "url": "https://bugs.gentoo.org/726308", + "refsource": "MISC", + "name": "https://bugs.gentoo.org/726308" + }, + { + "url": "https://github.com/troglobit/uftpd/releases/tag/v2.12", + "refsource": "MISC", + "name": "https://github.com/troglobit/uftpd/releases/tag/v2.12" } ] } diff --git a/2020/14xxx/CVE-2020-14156.json b/2020/14xxx/CVE-2020-14156.json new file mode 100644 index 00000000000..3c8ec52a7c2 --- /dev/null +++ b/2020/14xxx/CVE-2020-14156.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-14156", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "user_channel/passwd_mgr.cpp in OpenBMC phosphor-host-ipmid before 2020-04-03 does not ensure that /etc/ipmi-pass has strong file permissions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openbmc/phosphor-host-ipmid/commit/b265455a2518ece7c004b43c144199ec980fc620", + "refsource": "MISC", + "name": "https://github.com/openbmc/phosphor-host-ipmid/commit/b265455a2518ece7c004b43c144199ec980fc620" + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14157.json b/2020/14xxx/CVE-2020-14157.json new file mode 100644 index 00000000000..f5242ccbc52 --- /dev/null +++ b/2020/14xxx/CVE-2020-14157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14158.json b/2020/14xxx/CVE-2020-14158.json new file mode 100644 index 00000000000..6947643bd89 --- /dev/null +++ b/2020/14xxx/CVE-2020-14158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/2xxx/CVE-2020-2585.json b/2020/2xxx/CVE-2020-2585.json index 86521d032db..62ea064953c 100644 --- a/2020/2xxx/CVE-2020-2585.json +++ b/2020/2xxx/CVE-2020-2585.json @@ -1,4 +1,3 @@ - { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", @@ -70,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200122-0003/", "url": "https://security.netapp.com/advisory/ntap-20200122-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2755.json b/2020/2xxx/CVE-2020-2755.json index fba63886bd0..a83ec3390b8 100644 --- a/2020/2xxx/CVE-2020-2755.json +++ b/2020/2xxx/CVE-2020-2755.json @@ -113,6 +113,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2756.json b/2020/2xxx/CVE-2020-2756.json index 956b6517e81..3874068f852 100644 --- a/2020/2xxx/CVE-2020-2756.json +++ b/2020/2xxx/CVE-2020-2756.json @@ -118,6 +118,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2757.json b/2020/2xxx/CVE-2020-2757.json index dd677acf94e..ae4529b581e 100644 --- a/2020/2xxx/CVE-2020-2757.json +++ b/2020/2xxx/CVE-2020-2757.json @@ -118,6 +118,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2773.json b/2020/2xxx/CVE-2020-2773.json index b412741bb79..681b93c7262 100644 --- a/2020/2xxx/CVE-2020-2773.json +++ b/2020/2xxx/CVE-2020-2773.json @@ -118,6 +118,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2781.json b/2020/2xxx/CVE-2020-2781.json index dbcfd9b8e21..6031716a48a 100644 --- a/2020/2xxx/CVE-2020-2781.json +++ b/2020/2xxx/CVE-2020-2781.json @@ -118,6 +118,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2800.json b/2020/2xxx/CVE-2020-2800.json index 6902e8443aa..e445745e903 100644 --- a/2020/2xxx/CVE-2020-2800.json +++ b/2020/2xxx/CVE-2020-2800.json @@ -118,6 +118,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2803.json b/2020/2xxx/CVE-2020-2803.json index 35b63ae252a..7162f1078f2 100644 --- a/2020/2xxx/CVE-2020-2803.json +++ b/2020/2xxx/CVE-2020-2803.json @@ -118,6 +118,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2805.json b/2020/2xxx/CVE-2020-2805.json index 3dbdaf910bb..ec766be55b1 100644 --- a/2020/2xxx/CVE-2020-2805.json +++ b/2020/2xxx/CVE-2020-2805.json @@ -118,6 +118,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/2xxx/CVE-2020-2830.json b/2020/2xxx/CVE-2020-2830.json index 77ae4ca1cac..73795e41c98 100644 --- a/2020/2xxx/CVE-2020-2830.json +++ b/2020/2xxx/CVE-2020-2830.json @@ -113,6 +113,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0800", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-22", + "url": "https://security.gentoo.org/glsa/202006-22" } ] } diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index 402e6a51bbf..1ac31c900d3 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -93,6 +93,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html", "url": "http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202006-21", + "url": "https://security.gentoo.org/glsa/202006-21" } ] },