diff --git a/2013/7xxx/CVE-2013-7487.json b/2013/7xxx/CVE-2013-7487.json new file mode 100644 index 00000000000..1bc061c0fd1 --- /dev/null +++ b/2013/7xxx/CVE-2013-7487.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2013-7487", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9674.json b/2019/9xxx/CVE-2019-9674.json index 0b33a89957f..82853650d2b 100644 --- a/2019/9xxx/CVE-2019-9674.json +++ b/2019/9xxx/CVE-2019-9674.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200221-0003/", "url": "https://security.netapp.com/advisory/ntap-20200221-0003/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:0274", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" } ] } diff --git a/2020/1xxx/CVE-2020-1938.json b/2020/1xxx/CVE-2020-1938.json index 4800dcece98..8c7f562418a 100644 --- a/2020/1xxx/CVE-2020-1938.json +++ b/2020/1xxx/CVE-2020-1938.json @@ -89,6 +89,11 @@ "refsource": "MLIST", "name": "[ofbiz-notifications] 20200228 [jira] [Comment Edited] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)", "url": "https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20200301 Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution", + "url": "https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E" } ] }, diff --git a/2020/8xxx/CVE-2020-8492.json b/2020/8xxx/CVE-2020-8492.json index 0c06c987df4..d8543f2db92 100644 --- a/2020/8xxx/CVE-2020-8492.json +++ b/2020/8xxx/CVE-2020-8492.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200221-0001/", "url": "https://security.netapp.com/advisory/ntap-20200221-0001/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:0274", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" } ] } diff --git a/2020/9xxx/CVE-2020-9541.json b/2020/9xxx/CVE-2020-9541.json new file mode 100644 index 00000000000..68eb1dbb4df --- /dev/null +++ b/2020/9xxx/CVE-2020-9541.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9541", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9542.json b/2020/9xxx/CVE-2020-9542.json new file mode 100644 index 00000000000..8546373ede6 --- /dev/null +++ b/2020/9xxx/CVE-2020-9542.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9542", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9543.json b/2020/9xxx/CVE-2020-9543.json new file mode 100644 index 00000000000..9fe3e5f323f --- /dev/null +++ b/2020/9xxx/CVE-2020-9543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9544.json b/2020/9xxx/CVE-2020-9544.json new file mode 100644 index 00000000000..c2ac460dbaf --- /dev/null +++ b/2020/9xxx/CVE-2020-9544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9545.json b/2020/9xxx/CVE-2020-9545.json new file mode 100644 index 00000000000..30a9549f9fa --- /dev/null +++ b/2020/9xxx/CVE-2020-9545.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-9545", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Pale Moon 28.8.x before 28.8.4 has a segmentation fault related to module scripting, as demonstrated by a Lacoste web site." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.palemoon.org/viewtopic.php?f=37&t=23864", + "refsource": "MISC", + "name": "https://forum.palemoon.org/viewtopic.php?f=37&t=23864" + }, + { + "url": "http://www.palemoon.org/releasenotes.shtml", + "refsource": "MISC", + "name": "http://www.palemoon.org/releasenotes.shtml" + } + ] + } +} \ No newline at end of file