diff --git a/2020/0xxx/CVE-2020-0594.json b/2020/0xxx/CVE-2020-0594.json index 767382a0ca6..7c0a34e7013 100644 --- a/2020/0xxx/CVE-2020-0594.json +++ b/2020/0xxx/CVE-2020-0594.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", + "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ] }, diff --git a/2020/0xxx/CVE-2020-0595.json b/2020/0xxx/CVE-2020-0595.json index 2665f6046ef..4b4916d0b5e 100644 --- a/2020/0xxx/CVE-2020-0595.json +++ b/2020/0xxx/CVE-2020-0595.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", + "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ] }, diff --git a/2020/0xxx/CVE-2020-0596.json b/2020/0xxx/CVE-2020-0596.json index 176c11332e3..0ecbfed15cd 100644 --- a/2020/0xxx/CVE-2020-0596.json +++ b/2020/0xxx/CVE-2020-0596.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", + "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ] }, diff --git a/2020/0xxx/CVE-2020-0597.json b/2020/0xxx/CVE-2020-0597.json index 3c5765808e8..f1b37f688e1 100644 --- a/2020/0xxx/CVE-2020-0597.json +++ b/2020/0xxx/CVE-2020-0597.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", + "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ] }, diff --git a/2020/14xxx/CVE-2020-14938.json b/2020/14xxx/CVE-2020-14938.json new file mode 100644 index 00000000000..345d05afcb2 --- /dev/null +++ b/2020/14xxx/CVE-2020-14938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14939.json b/2020/14xxx/CVE-2020-14939.json new file mode 100644 index 00000000000..7c04930fed3 --- /dev/null +++ b/2020/14xxx/CVE-2020-14939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14940.json b/2020/14xxx/CVE-2020-14940.json new file mode 100644 index 00000000000..e667d9349aa --- /dev/null +++ b/2020/14xxx/CVE-2020-14940.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14940", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14941.json b/2020/14xxx/CVE-2020-14941.json new file mode 100644 index 00000000000..1af41abbe0b --- /dev/null +++ b/2020/14xxx/CVE-2020-14941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8674.json b/2020/8xxx/CVE-2020-8674.json index f34bef8534a..cfc5330a7db 100644 --- a/2020/8xxx/CVE-2020-8674.json +++ b/2020/8xxx/CVE-2020-8674.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", + "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ] },