diff --git a/2019/13xxx/CVE-2019-13361.json b/2019/13xxx/CVE-2019-13361.json index df4413dfb29..d186940504a 100644 --- a/2019/13xxx/CVE-2019-13361.json +++ b/2019/13xxx/CVE-2019-13361.json @@ -54,8 +54,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://github.com/lodi-g/CVE-2019-1336", - "url": "https://github.com/lodi-g/CVE-2019-1336" + "name": "https://github.com/lodi-g/CVE-2019-13361/", + "url": "https://github.com/lodi-g/CVE-2019-13361/" } ] } diff --git a/2020/0xxx/CVE-2020-0387.json b/2020/0xxx/CVE-2020-0387.json new file mode 100644 index 00000000000..67fabf91e4e --- /dev/null +++ b/2020/0xxx/CVE-2020-0387.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0387", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In manifest files of the SmartSpace package, there is a possible tapjacking vector due to a missing permission check. This could lead to local escalation of privilege and account hijacking with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-156046804" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0403.json b/2020/0xxx/CVE-2020-0403.json new file mode 100644 index 00000000000..e4bfc38d4b3 --- /dev/null +++ b/2020/0xxx/CVE-2020-0403.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0403", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the FPC TrustZone fingerprint App, there is a possible invalid command handler due to an exposed test feature. This could lead to local escalation of privilege in the TEE, with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-131252923" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0427.json b/2020/0xxx/CVE-2020-0427.json new file mode 100644 index 00000000000..59b9751f6fc --- /dev/null +++ b/2020/0xxx/CVE-2020-0427.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0427", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0428.json b/2020/0xxx/CVE-2020-0428.json new file mode 100644 index 00000000000..bb49c604688 --- /dev/null +++ b/2020/0xxx/CVE-2020-0428.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0428", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In CamX code, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-123999783" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0429.json b/2020/0xxx/CVE-2020-0429.json new file mode 100644 index 00000000000..50ae33380e5 --- /dev/null +++ b/2020/0xxx/CVE-2020-0429.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0429", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0430.json b/2020/0xxx/CVE-2020-0430.json new file mode 100644 index 00000000000..c27a8465868 --- /dev/null +++ b/2020/0xxx/CVE-2020-0430.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0430", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0431.json b/2020/0xxx/CVE-2020-0431.json new file mode 100644 index 00000000000..f11d495aa7f --- /dev/null +++ b/2020/0xxx/CVE-2020-0431.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0431", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0432.json b/2020/0xxx/CVE-2020-0432.json new file mode 100644 index 00000000000..3e4d9a64268 --- /dev/null +++ b/2020/0xxx/CVE-2020-0432.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0432", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0433.json b/2020/0xxx/CVE-2020-0433.json new file mode 100644 index 00000000000..8d03083f314 --- /dev/null +++ b/2020/0xxx/CVE-2020-0433.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0433", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0434.json b/2020/0xxx/CVE-2020-0434.json new file mode 100644 index 00000000000..fa034e30217 --- /dev/null +++ b/2020/0xxx/CVE-2020-0434.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0434", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Pixel's use of the Catpipe library, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150730508" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0435.json b/2020/0xxx/CVE-2020-0435.json new file mode 100644 index 00000000000..008952ca8d3 --- /dev/null +++ b/2020/0xxx/CVE-2020-0435.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0435", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2020-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2020-09-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In inline_data_addr of f2fs.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-133762747" + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10204.json b/2020/10xxx/CVE-2020-10204.json index be4e570eb61..57c6717bfac 100644 --- a/2020/10xxx/CVE-2020-10204.json +++ b/2020/10xxx/CVE-2020-10204.json @@ -54,8 +54,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://support.sonatype.com/hc/en-us/articles/360044882533", - "url": "https://support.sonatype.com/hc/en-us/articles/360044882533" + "name": "https://support.sonatype.com/hc/en-us/articles/360044356194", + "url": "https://support.sonatype.com/hc/en-us/articles/360044356194" } ] } diff --git a/2020/24xxx/CVE-2020-24750.json b/2020/24xxx/CVE-2020-24750.json index dde6b9e806b..9df9d8d4e69 100644 --- a/2020/24xxx/CVE-2020-24750.json +++ b/2020/24xxx/CVE-2020-24750.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24750", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24750", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/FasterXML/jackson-databind/issues/2798", + "refsource": "MISC", + "name": "https://github.com/FasterXML/jackson-databind/issues/2798" } ] } diff --git a/2020/25xxx/CVE-2020-25015.json b/2020/25xxx/CVE-2020-25015.json index 916f5f3a831..9237b9a7b96 100644 --- a/2020/25xxx/CVE-2020-25015.json +++ b/2020/25xxx/CVE-2020-25015.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.getastra.com/blog/911/csrf-broken-access-control-in-genexis-platinum-4410/", "url": "https://www.getastra.com/blog/911/csrf-broken-access-control-in-genexis-platinum-4410/" + }, + { + "refsource": "MISC", + "name": "https://www.jinsonvarghese.com/broken-access-control-csrf-in-genexis-platinum-4410/", + "url": "https://www.jinsonvarghese.com/broken-access-control-csrf-in-genexis-platinum-4410/" } ] } diff --git a/2020/25xxx/CVE-2020-25215.json b/2020/25xxx/CVE-2020-25215.json index 3a209b734f9..83982422b7f 100644 --- a/2020/25xxx/CVE-2020-25215.json +++ b/2020/25xxx/CVE-2020-25215.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25215", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25215", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "yWorks yEd Desktop before 3.20.1 allows XXE attacks via an XML or GraphML document." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.yworks.com/products/yed/download", + "refsource": "MISC", + "name": "https://www.yworks.com/products/yed/download" } ] } diff --git a/2020/25xxx/CVE-2020-25216.json b/2020/25xxx/CVE-2020-25216.json index 1025dcb32e3..64d102e0921 100644 --- a/2020/25xxx/CVE-2020-25216.json +++ b/2020/25xxx/CVE-2020-25216.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25216", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25216", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "yWorks yEd Desktop before 3.20.1 allows code execution via an XSL Transformation when using an XML file in conjunction with a custom stylesheet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.yworks.com/products/yed/download", + "refsource": "MISC", + "name": "https://www.yworks.com/products/yed/download" } ] } diff --git a/2020/25xxx/CVE-2020-25737.json b/2020/25xxx/CVE-2020-25737.json new file mode 100644 index 00000000000..88e801f7cdb --- /dev/null +++ b/2020/25xxx/CVE-2020-25737.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-25737", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/25xxx/CVE-2020-25738.json b/2020/25xxx/CVE-2020-25738.json new file mode 100644 index 00000000000..dc2d3cd89bd --- /dev/null +++ b/2020/25xxx/CVE-2020-25738.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-25738", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/25xxx/CVE-2020-25739.json b/2020/25xxx/CVE-2020-25739.json new file mode 100644 index 00000000000..dad36041198 --- /dev/null +++ b/2020/25xxx/CVE-2020-25739.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-25739", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file