From 853bb9ec590a7ac74602297b5381681a02ae48ac Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 19 Jun 2020 17:03:25 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/20xxx/CVE-2019-20875.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20876.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20877.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20878.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20879.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20880.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20881.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20882.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20883.json | 56 +++++++++++++++++++++++++---- 2019/20xxx/CVE-2019-20885.json | 56 +++++++++++++++++++++++++---- 2020/13xxx/CVE-2020-13961.json | 66 ++++++++++++++++++++++++++++++---- 2020/14xxx/CVE-2020-14475.json | 56 +++++++++++++++++++++++++---- 2020/14xxx/CVE-2020-14634.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14635.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14636.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14637.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14638.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14639.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14640.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14641.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14642.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14643.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14644.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14645.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14646.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14647.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14648.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14649.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14650.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14651.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14652.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14653.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14654.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14655.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14656.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14657.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14658.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14659.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14660.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14661.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14662.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14663.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14664.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14665.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14666.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14667.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14668.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14669.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14670.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14671.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14672.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14673.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14674.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14675.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14676.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14677.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14678.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14679.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14680.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14681.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14682.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14889.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14890.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14891.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14892.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14893.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14894.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14895.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14896.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14897.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14898.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14899.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14900.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14901.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14902.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14903.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14904.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14905.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14906.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14907.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14908.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14909.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14910.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14911.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14912.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14913.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14914.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14915.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14916.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14917.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14918.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14919.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14920.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14921.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14922.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14923.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14924.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14925.json | 18 ++++++++++ 2020/14xxx/CVE-2020-14926.json | 56 +++++++++++++++++++++++++---- 2020/14xxx/CVE-2020-14927.json | 56 +++++++++++++++++++++++++---- 100 files changed, 2258 insertions(+), 84 deletions(-) create mode 100644 2020/14xxx/CVE-2020-14634.json create mode 100644 2020/14xxx/CVE-2020-14635.json create mode 100644 2020/14xxx/CVE-2020-14636.json create mode 100644 2020/14xxx/CVE-2020-14637.json create mode 100644 2020/14xxx/CVE-2020-14638.json create mode 100644 2020/14xxx/CVE-2020-14639.json create mode 100644 2020/14xxx/CVE-2020-14640.json create mode 100644 2020/14xxx/CVE-2020-14641.json create mode 100644 2020/14xxx/CVE-2020-14642.json create mode 100644 2020/14xxx/CVE-2020-14643.json create mode 100644 2020/14xxx/CVE-2020-14644.json create mode 100644 2020/14xxx/CVE-2020-14645.json create mode 100644 2020/14xxx/CVE-2020-14646.json create mode 100644 2020/14xxx/CVE-2020-14647.json create mode 100644 2020/14xxx/CVE-2020-14648.json create mode 100644 2020/14xxx/CVE-2020-14649.json create mode 100644 2020/14xxx/CVE-2020-14650.json create mode 100644 2020/14xxx/CVE-2020-14651.json create mode 100644 2020/14xxx/CVE-2020-14652.json create mode 100644 2020/14xxx/CVE-2020-14653.json create mode 100644 2020/14xxx/CVE-2020-14654.json create mode 100644 2020/14xxx/CVE-2020-14655.json create mode 100644 2020/14xxx/CVE-2020-14656.json create mode 100644 2020/14xxx/CVE-2020-14657.json create mode 100644 2020/14xxx/CVE-2020-14658.json create mode 100644 2020/14xxx/CVE-2020-14659.json create mode 100644 2020/14xxx/CVE-2020-14660.json create mode 100644 2020/14xxx/CVE-2020-14661.json create mode 100644 2020/14xxx/CVE-2020-14662.json create mode 100644 2020/14xxx/CVE-2020-14663.json create mode 100644 2020/14xxx/CVE-2020-14664.json create mode 100644 2020/14xxx/CVE-2020-14665.json create mode 100644 2020/14xxx/CVE-2020-14666.json create mode 100644 2020/14xxx/CVE-2020-14667.json create mode 100644 2020/14xxx/CVE-2020-14668.json create mode 100644 2020/14xxx/CVE-2020-14669.json create mode 100644 2020/14xxx/CVE-2020-14670.json create mode 100644 2020/14xxx/CVE-2020-14671.json create mode 100644 2020/14xxx/CVE-2020-14672.json create mode 100644 2020/14xxx/CVE-2020-14673.json create mode 100644 2020/14xxx/CVE-2020-14674.json create mode 100644 2020/14xxx/CVE-2020-14675.json create mode 100644 2020/14xxx/CVE-2020-14676.json create mode 100644 2020/14xxx/CVE-2020-14677.json create mode 100644 2020/14xxx/CVE-2020-14678.json create mode 100644 2020/14xxx/CVE-2020-14679.json create mode 100644 2020/14xxx/CVE-2020-14680.json create mode 100644 2020/14xxx/CVE-2020-14681.json create mode 100644 2020/14xxx/CVE-2020-14682.json create mode 100644 2020/14xxx/CVE-2020-14889.json create mode 100644 2020/14xxx/CVE-2020-14890.json create mode 100644 2020/14xxx/CVE-2020-14891.json create mode 100644 2020/14xxx/CVE-2020-14892.json create mode 100644 2020/14xxx/CVE-2020-14893.json create mode 100644 2020/14xxx/CVE-2020-14894.json create mode 100644 2020/14xxx/CVE-2020-14895.json create mode 100644 2020/14xxx/CVE-2020-14896.json create mode 100644 2020/14xxx/CVE-2020-14897.json create mode 100644 2020/14xxx/CVE-2020-14898.json create mode 100644 2020/14xxx/CVE-2020-14899.json create mode 100644 2020/14xxx/CVE-2020-14900.json create mode 100644 2020/14xxx/CVE-2020-14901.json create mode 100644 2020/14xxx/CVE-2020-14902.json create mode 100644 2020/14xxx/CVE-2020-14903.json create mode 100644 2020/14xxx/CVE-2020-14904.json create mode 100644 2020/14xxx/CVE-2020-14905.json create mode 100644 2020/14xxx/CVE-2020-14906.json create mode 100644 2020/14xxx/CVE-2020-14907.json create mode 100644 2020/14xxx/CVE-2020-14908.json create mode 100644 2020/14xxx/CVE-2020-14909.json create mode 100644 2020/14xxx/CVE-2020-14910.json create mode 100644 2020/14xxx/CVE-2020-14911.json create mode 100644 2020/14xxx/CVE-2020-14912.json create mode 100644 2020/14xxx/CVE-2020-14913.json create mode 100644 2020/14xxx/CVE-2020-14914.json create mode 100644 2020/14xxx/CVE-2020-14915.json create mode 100644 2020/14xxx/CVE-2020-14916.json create mode 100644 2020/14xxx/CVE-2020-14917.json create mode 100644 2020/14xxx/CVE-2020-14918.json create mode 100644 2020/14xxx/CVE-2020-14919.json create mode 100644 2020/14xxx/CVE-2020-14920.json create mode 100644 2020/14xxx/CVE-2020-14921.json create mode 100644 2020/14xxx/CVE-2020-14922.json create mode 100644 2020/14xxx/CVE-2020-14923.json create mode 100644 2020/14xxx/CVE-2020-14924.json create mode 100644 2020/14xxx/CVE-2020-14925.json diff --git a/2019/20xxx/CVE-2019-20875.json b/2019/20xxx/CVE-2019-20875.json index 711956892d3..062c8d31b2e 100644 --- a/2019/20xxx/CVE-2019-20875.json +++ b/2019/20xxx/CVE-2019-20875.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20875", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20875", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. It allows a password reset to proceed while an e-mail address is being changed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20876.json b/2019/20xxx/CVE-2019-20876.json index 6b9fc5c99f7..b6375086275 100644 --- a/2019/20xxx/CVE-2019-20876.json +++ b/2019/20xxx/CVE-2019-20876.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20876", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20876", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. Users can deactivate themselves, bypassing a policy." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20877.json b/2019/20xxx/CVE-2019-20877.json index d5e77635c59..1cbb40e0a89 100644 --- a/2019/20xxx/CVE-2019-20877.json +++ b/2019/20xxx/CVE-2019-20877.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20877", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20877", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. It allows attackers to obtain sensitive information about whether someone has 2FA enabled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20878.json b/2019/20xxx/CVE-2019-20878.json index 13520945760..7898b438a14 100644 --- a/2019/20xxx/CVE-2019-20878.json +++ b/2019/20xxx/CVE-2019-20878.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20878", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20878", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. Changes, within the application, to e-mail addresses are mishandled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20879.json b/2019/20xxx/CVE-2019-20879.json index 5717897ca99..2f21bc5d3bb 100644 --- a/2019/20xxx/CVE-2019-20879.json +++ b/2019/20xxx/CVE-2019-20879.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20879", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20879", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.8.0, 5.7.2, 5.6.5, and 4.10.7. Changes to e-mail addresses do not require credential re-entry." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20880.json b/2019/20xxx/CVE-2019-20880.json index 4f82e167809..df77c935ec4 100644 --- a/2019/20xxx/CVE-2019-20880.json +++ b/2019/20xxx/CVE-2019-20880.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20880", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20880", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.8.0, 5.7.2, 5.6.5, and 4.10.7. It allows attackers to cause a denial of service (memory consumption) via OpenGraph." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20881.json b/2019/20xxx/CVE-2019-20881.json index 5817a4d10ae..4e19eaf15b8 100644 --- a/2019/20xxx/CVE-2019-20881.json +++ b/2019/20xxx/CVE-2019-20881.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20881", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20881", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.8.0. It mishandles brute-force attacks against MFA." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20882.json b/2019/20xxx/CVE-2019-20882.json index 8418fd64c9f..15817862a94 100644 --- a/2019/20xxx/CVE-2019-20882.json +++ b/2019/20xxx/CVE-2019-20882.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20882", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20882", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.8.0. It does not honor the domain requirement when processing a join request for an open team." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20883.json b/2019/20xxx/CVE-2019-20883.json index 28631062d2c..3a0c7519124 100644 --- a/2019/20xxx/CVE-2019-20883.json +++ b/2019/20xxx/CVE-2019-20883.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20883", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20883", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.8.0, when Town Square is set to Read-Only. Users can pin or unpin a post." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2019/20xxx/CVE-2019-20885.json b/2019/20xxx/CVE-2019-20885.json index 6ba29390983..b48729607ee 100644 --- a/2019/20xxx/CVE-2019-20885.json +++ b/2019/20xxx/CVE-2019-20885.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20885", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20885", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Mattermost Server before 5.8.0. It does not always generate a robots.txt file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://mattermost.com/security-updates/", + "url": "https://mattermost.com/security-updates/" } ] } diff --git a/2020/13xxx/CVE-2020-13961.json b/2020/13xxx/CVE-2020-13961.json index 5be596b4283..f034b5245ff 100644 --- a/2020/13xxx/CVE-2020-13961.json +++ b/2020/13xxx/CVE-2020-13961.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13961", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13961", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/strapi/strapi/releases/tag/v3.0.2", + "url": "https://github.com/strapi/strapi/releases/tag/v3.0.2" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/strapi/strapi/pull/6599", + "url": "https://github.com/strapi/strapi/pull/6599" } ] } diff --git a/2020/14xxx/CVE-2020-14475.json b/2020/14xxx/CVE-2020-14475.json index 08b70eadc34..d3d9d4d8a11 100644 --- a/2020/14xxx/CVE-2020-14475.json +++ b/2020/14xxx/CVE-2020-14475.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14475", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14475", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected cross-site scripting (XSS) vulnerability in Dolibarr 11.0.3 allows remote attackers to inject arbitrary web script or HTML into public/notice.php (related to transphrase and transkey)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Dolibarr/dolibarr/commit/22ca5e067189bffe8066df26df923a386f044c08", + "refsource": "MISC", + "name": "https://github.com/Dolibarr/dolibarr/commit/22ca5e067189bffe8066df26df923a386f044c08" } ] } diff --git a/2020/14xxx/CVE-2020-14634.json b/2020/14xxx/CVE-2020-14634.json new file mode 100644 index 00000000000..a5b6c3c4f60 --- /dev/null +++ b/2020/14xxx/CVE-2020-14634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14635.json b/2020/14xxx/CVE-2020-14635.json new file mode 100644 index 00000000000..81947cbc3b7 --- /dev/null +++ b/2020/14xxx/CVE-2020-14635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14636.json b/2020/14xxx/CVE-2020-14636.json new file mode 100644 index 00000000000..09d0baaf00f --- /dev/null +++ b/2020/14xxx/CVE-2020-14636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14637.json b/2020/14xxx/CVE-2020-14637.json new file mode 100644 index 00000000000..d36944f6d39 --- /dev/null +++ b/2020/14xxx/CVE-2020-14637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14638.json b/2020/14xxx/CVE-2020-14638.json new file mode 100644 index 00000000000..657f2e0aff6 --- /dev/null +++ b/2020/14xxx/CVE-2020-14638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14639.json b/2020/14xxx/CVE-2020-14639.json new file mode 100644 index 00000000000..4d9d9363f9b --- /dev/null +++ b/2020/14xxx/CVE-2020-14639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14640.json b/2020/14xxx/CVE-2020-14640.json new file mode 100644 index 00000000000..d582a257ea7 --- /dev/null +++ b/2020/14xxx/CVE-2020-14640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14641.json b/2020/14xxx/CVE-2020-14641.json new file mode 100644 index 00000000000..3db6786a214 --- /dev/null +++ b/2020/14xxx/CVE-2020-14641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14642.json b/2020/14xxx/CVE-2020-14642.json new file mode 100644 index 00000000000..ad681535839 --- /dev/null +++ b/2020/14xxx/CVE-2020-14642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14643.json b/2020/14xxx/CVE-2020-14643.json new file mode 100644 index 00000000000..733eb3c2073 --- /dev/null +++ b/2020/14xxx/CVE-2020-14643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14644.json b/2020/14xxx/CVE-2020-14644.json new file mode 100644 index 00000000000..673962ed869 --- /dev/null +++ b/2020/14xxx/CVE-2020-14644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14645.json b/2020/14xxx/CVE-2020-14645.json new file mode 100644 index 00000000000..3c4890713a9 --- /dev/null +++ b/2020/14xxx/CVE-2020-14645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14646.json b/2020/14xxx/CVE-2020-14646.json new file mode 100644 index 00000000000..736a2f22891 --- /dev/null +++ b/2020/14xxx/CVE-2020-14646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14647.json b/2020/14xxx/CVE-2020-14647.json new file mode 100644 index 00000000000..57c1c042625 --- /dev/null +++ b/2020/14xxx/CVE-2020-14647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14648.json b/2020/14xxx/CVE-2020-14648.json new file mode 100644 index 00000000000..be96896cd2e --- /dev/null +++ b/2020/14xxx/CVE-2020-14648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14649.json b/2020/14xxx/CVE-2020-14649.json new file mode 100644 index 00000000000..f90950a7a14 --- /dev/null +++ b/2020/14xxx/CVE-2020-14649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14650.json b/2020/14xxx/CVE-2020-14650.json new file mode 100644 index 00000000000..8e45124859d --- /dev/null +++ b/2020/14xxx/CVE-2020-14650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14651.json b/2020/14xxx/CVE-2020-14651.json new file mode 100644 index 00000000000..73d512f8abb --- /dev/null +++ b/2020/14xxx/CVE-2020-14651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14652.json b/2020/14xxx/CVE-2020-14652.json new file mode 100644 index 00000000000..6b763615122 --- /dev/null +++ b/2020/14xxx/CVE-2020-14652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14653.json b/2020/14xxx/CVE-2020-14653.json new file mode 100644 index 00000000000..f6891cc0f88 --- /dev/null +++ b/2020/14xxx/CVE-2020-14653.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14653", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14654.json b/2020/14xxx/CVE-2020-14654.json new file mode 100644 index 00000000000..190c723a095 --- /dev/null +++ b/2020/14xxx/CVE-2020-14654.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14654", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14655.json b/2020/14xxx/CVE-2020-14655.json new file mode 100644 index 00000000000..e923261f06c --- /dev/null +++ b/2020/14xxx/CVE-2020-14655.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14655", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14656.json b/2020/14xxx/CVE-2020-14656.json new file mode 100644 index 00000000000..67ff674dcb4 --- /dev/null +++ b/2020/14xxx/CVE-2020-14656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14657.json b/2020/14xxx/CVE-2020-14657.json new file mode 100644 index 00000000000..fcec9602057 --- /dev/null +++ b/2020/14xxx/CVE-2020-14657.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14657", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14658.json b/2020/14xxx/CVE-2020-14658.json new file mode 100644 index 00000000000..84a941031bb --- /dev/null +++ b/2020/14xxx/CVE-2020-14658.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14658", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14659.json b/2020/14xxx/CVE-2020-14659.json new file mode 100644 index 00000000000..98dc97bcde2 --- /dev/null +++ b/2020/14xxx/CVE-2020-14659.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14659", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14660.json b/2020/14xxx/CVE-2020-14660.json new file mode 100644 index 00000000000..aafc88ea061 --- /dev/null +++ b/2020/14xxx/CVE-2020-14660.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14660", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14661.json b/2020/14xxx/CVE-2020-14661.json new file mode 100644 index 00000000000..07a300dbe60 --- /dev/null +++ b/2020/14xxx/CVE-2020-14661.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14661", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14662.json b/2020/14xxx/CVE-2020-14662.json new file mode 100644 index 00000000000..bd612e46d70 --- /dev/null +++ b/2020/14xxx/CVE-2020-14662.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14662", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14663.json b/2020/14xxx/CVE-2020-14663.json new file mode 100644 index 00000000000..c93ccd3849c --- /dev/null +++ b/2020/14xxx/CVE-2020-14663.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14663", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14664.json b/2020/14xxx/CVE-2020-14664.json new file mode 100644 index 00000000000..27f0d11f49b --- /dev/null +++ b/2020/14xxx/CVE-2020-14664.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14664", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14665.json b/2020/14xxx/CVE-2020-14665.json new file mode 100644 index 00000000000..b3e28deef56 --- /dev/null +++ b/2020/14xxx/CVE-2020-14665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14666.json b/2020/14xxx/CVE-2020-14666.json new file mode 100644 index 00000000000..e8fb30f7cd5 --- /dev/null +++ b/2020/14xxx/CVE-2020-14666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14667.json b/2020/14xxx/CVE-2020-14667.json new file mode 100644 index 00000000000..42362621237 --- /dev/null +++ b/2020/14xxx/CVE-2020-14667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14668.json b/2020/14xxx/CVE-2020-14668.json new file mode 100644 index 00000000000..2e38b11b8ae --- /dev/null +++ b/2020/14xxx/CVE-2020-14668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14669.json b/2020/14xxx/CVE-2020-14669.json new file mode 100644 index 00000000000..3d80e94a07f --- /dev/null +++ b/2020/14xxx/CVE-2020-14669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14670.json b/2020/14xxx/CVE-2020-14670.json new file mode 100644 index 00000000000..03f9c39a71f --- /dev/null +++ b/2020/14xxx/CVE-2020-14670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14671.json b/2020/14xxx/CVE-2020-14671.json new file mode 100644 index 00000000000..87a11ce06ff --- /dev/null +++ b/2020/14xxx/CVE-2020-14671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14672.json b/2020/14xxx/CVE-2020-14672.json new file mode 100644 index 00000000000..249a2acd3c1 --- /dev/null +++ b/2020/14xxx/CVE-2020-14672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14673.json b/2020/14xxx/CVE-2020-14673.json new file mode 100644 index 00000000000..2b1e987845e --- /dev/null +++ b/2020/14xxx/CVE-2020-14673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14674.json b/2020/14xxx/CVE-2020-14674.json new file mode 100644 index 00000000000..2395380a067 --- /dev/null +++ b/2020/14xxx/CVE-2020-14674.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14674", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14675.json b/2020/14xxx/CVE-2020-14675.json new file mode 100644 index 00000000000..f8111d9024f --- /dev/null +++ b/2020/14xxx/CVE-2020-14675.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14675", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14676.json b/2020/14xxx/CVE-2020-14676.json new file mode 100644 index 00000000000..010a99c155f --- /dev/null +++ b/2020/14xxx/CVE-2020-14676.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14676", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14677.json b/2020/14xxx/CVE-2020-14677.json new file mode 100644 index 00000000000..9760847b648 --- /dev/null +++ b/2020/14xxx/CVE-2020-14677.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14677", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14678.json b/2020/14xxx/CVE-2020-14678.json new file mode 100644 index 00000000000..9afcb378a03 --- /dev/null +++ b/2020/14xxx/CVE-2020-14678.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14678", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14679.json b/2020/14xxx/CVE-2020-14679.json new file mode 100644 index 00000000000..db8e38b93ce --- /dev/null +++ b/2020/14xxx/CVE-2020-14679.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14679", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14680.json b/2020/14xxx/CVE-2020-14680.json new file mode 100644 index 00000000000..321ea517acd --- /dev/null +++ b/2020/14xxx/CVE-2020-14680.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14680", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14681.json b/2020/14xxx/CVE-2020-14681.json new file mode 100644 index 00000000000..23128883728 --- /dev/null +++ b/2020/14xxx/CVE-2020-14681.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14681", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14682.json b/2020/14xxx/CVE-2020-14682.json new file mode 100644 index 00000000000..55e285575ea --- /dev/null +++ b/2020/14xxx/CVE-2020-14682.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14682", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14889.json b/2020/14xxx/CVE-2020-14889.json new file mode 100644 index 00000000000..17298f36a81 --- /dev/null +++ b/2020/14xxx/CVE-2020-14889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14890.json b/2020/14xxx/CVE-2020-14890.json new file mode 100644 index 00000000000..2856fb47ef6 --- /dev/null +++ b/2020/14xxx/CVE-2020-14890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14891.json b/2020/14xxx/CVE-2020-14891.json new file mode 100644 index 00000000000..42c0576c949 --- /dev/null +++ b/2020/14xxx/CVE-2020-14891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14892.json b/2020/14xxx/CVE-2020-14892.json new file mode 100644 index 00000000000..e708f32c01c --- /dev/null +++ b/2020/14xxx/CVE-2020-14892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14893.json b/2020/14xxx/CVE-2020-14893.json new file mode 100644 index 00000000000..321799422fe --- /dev/null +++ b/2020/14xxx/CVE-2020-14893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14894.json b/2020/14xxx/CVE-2020-14894.json new file mode 100644 index 00000000000..6cf5284c561 --- /dev/null +++ b/2020/14xxx/CVE-2020-14894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14895.json b/2020/14xxx/CVE-2020-14895.json new file mode 100644 index 00000000000..59169676726 --- /dev/null +++ b/2020/14xxx/CVE-2020-14895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14896.json b/2020/14xxx/CVE-2020-14896.json new file mode 100644 index 00000000000..a029a09ca67 --- /dev/null +++ b/2020/14xxx/CVE-2020-14896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14897.json b/2020/14xxx/CVE-2020-14897.json new file mode 100644 index 00000000000..51f981b5986 --- /dev/null +++ b/2020/14xxx/CVE-2020-14897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14898.json b/2020/14xxx/CVE-2020-14898.json new file mode 100644 index 00000000000..e612b907dc7 --- /dev/null +++ b/2020/14xxx/CVE-2020-14898.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14898", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14899.json b/2020/14xxx/CVE-2020-14899.json new file mode 100644 index 00000000000..49a442f30a9 --- /dev/null +++ b/2020/14xxx/CVE-2020-14899.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14899", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14900.json b/2020/14xxx/CVE-2020-14900.json new file mode 100644 index 00000000000..bae53d5bfac --- /dev/null +++ b/2020/14xxx/CVE-2020-14900.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14900", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14901.json b/2020/14xxx/CVE-2020-14901.json new file mode 100644 index 00000000000..529722b8e1d --- /dev/null +++ b/2020/14xxx/CVE-2020-14901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14902.json b/2020/14xxx/CVE-2020-14902.json new file mode 100644 index 00000000000..a06635b6575 --- /dev/null +++ b/2020/14xxx/CVE-2020-14902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14903.json b/2020/14xxx/CVE-2020-14903.json new file mode 100644 index 00000000000..190efb119b6 --- /dev/null +++ b/2020/14xxx/CVE-2020-14903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14904.json b/2020/14xxx/CVE-2020-14904.json new file mode 100644 index 00000000000..0a33e587a58 --- /dev/null +++ b/2020/14xxx/CVE-2020-14904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14905.json b/2020/14xxx/CVE-2020-14905.json new file mode 100644 index 00000000000..d091cd8570c --- /dev/null +++ b/2020/14xxx/CVE-2020-14905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14906.json b/2020/14xxx/CVE-2020-14906.json new file mode 100644 index 00000000000..48788838586 --- /dev/null +++ b/2020/14xxx/CVE-2020-14906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14907.json b/2020/14xxx/CVE-2020-14907.json new file mode 100644 index 00000000000..60507441dcf --- /dev/null +++ b/2020/14xxx/CVE-2020-14907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14908.json b/2020/14xxx/CVE-2020-14908.json new file mode 100644 index 00000000000..d135dd049e5 --- /dev/null +++ b/2020/14xxx/CVE-2020-14908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14909.json b/2020/14xxx/CVE-2020-14909.json new file mode 100644 index 00000000000..ed552d6decf --- /dev/null +++ b/2020/14xxx/CVE-2020-14909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14910.json b/2020/14xxx/CVE-2020-14910.json new file mode 100644 index 00000000000..e712c612fcf --- /dev/null +++ b/2020/14xxx/CVE-2020-14910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14911.json b/2020/14xxx/CVE-2020-14911.json new file mode 100644 index 00000000000..d137c995e0d --- /dev/null +++ b/2020/14xxx/CVE-2020-14911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14912.json b/2020/14xxx/CVE-2020-14912.json new file mode 100644 index 00000000000..0a3cc5b54d3 --- /dev/null +++ b/2020/14xxx/CVE-2020-14912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14913.json b/2020/14xxx/CVE-2020-14913.json new file mode 100644 index 00000000000..54f3210cdaa --- /dev/null +++ b/2020/14xxx/CVE-2020-14913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14914.json b/2020/14xxx/CVE-2020-14914.json new file mode 100644 index 00000000000..8906763e13c --- /dev/null +++ b/2020/14xxx/CVE-2020-14914.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14914", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14915.json b/2020/14xxx/CVE-2020-14915.json new file mode 100644 index 00000000000..d1e0b455ec9 --- /dev/null +++ b/2020/14xxx/CVE-2020-14915.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14915", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14916.json b/2020/14xxx/CVE-2020-14916.json new file mode 100644 index 00000000000..b62d2e1c4f9 --- /dev/null +++ b/2020/14xxx/CVE-2020-14916.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14916", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14917.json b/2020/14xxx/CVE-2020-14917.json new file mode 100644 index 00000000000..9c1a90ae6c0 --- /dev/null +++ b/2020/14xxx/CVE-2020-14917.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14917", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14918.json b/2020/14xxx/CVE-2020-14918.json new file mode 100644 index 00000000000..a7e138441cb --- /dev/null +++ b/2020/14xxx/CVE-2020-14918.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14918", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14919.json b/2020/14xxx/CVE-2020-14919.json new file mode 100644 index 00000000000..db3adc7fc6f --- /dev/null +++ b/2020/14xxx/CVE-2020-14919.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14919", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14920.json b/2020/14xxx/CVE-2020-14920.json new file mode 100644 index 00000000000..9eeba8324b2 --- /dev/null +++ b/2020/14xxx/CVE-2020-14920.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14920", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14921.json b/2020/14xxx/CVE-2020-14921.json new file mode 100644 index 00000000000..3da8267f13d --- /dev/null +++ b/2020/14xxx/CVE-2020-14921.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14921", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14922.json b/2020/14xxx/CVE-2020-14922.json new file mode 100644 index 00000000000..9e56950ce93 --- /dev/null +++ b/2020/14xxx/CVE-2020-14922.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14922", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14923.json b/2020/14xxx/CVE-2020-14923.json new file mode 100644 index 00000000000..04213a82230 --- /dev/null +++ b/2020/14xxx/CVE-2020-14923.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14923", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14924.json b/2020/14xxx/CVE-2020-14924.json new file mode 100644 index 00000000000..0ba9f58754a --- /dev/null +++ b/2020/14xxx/CVE-2020-14924.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14924", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14925.json b/2020/14xxx/CVE-2020-14925.json new file mode 100644 index 00000000000..ea5452185cb --- /dev/null +++ b/2020/14xxx/CVE-2020-14925.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14925", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14926.json b/2020/14xxx/CVE-2020-14926.json index 534bd8550f6..d7943f649c0 100644 --- a/2020/14xxx/CVE-2020-14926.json +++ b/2020/14xxx/CVE-2020-14926.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14926", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14926", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CMS Made Simple 2.2.14 allows XSS via a Search Term to the admin/moduleinterface.php?mact=ModuleManager page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://dev.cmsmadesimple.org/bug/view/12324", + "refsource": "MISC", + "name": "http://dev.cmsmadesimple.org/bug/view/12324" } ] } diff --git a/2020/14xxx/CVE-2020-14927.json b/2020/14xxx/CVE-2020-14927.json index 878a1862741..278f46d5fe4 100644 --- a/2020/14xxx/CVE-2020-14927.json +++ b/2020/14xxx/CVE-2020-14927.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14927", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14927", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Navigate CMS 2.9 allows XSS via the Alias or Real URL field of the \"Web Sites > Create > Aliases > Add\" screen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/19", + "refsource": "MISC", + "name": "https://github.com/NavigateCMS/Navigate-CMS/issues/19" } ] }