diff --git a/2014/6xxx/CVE-2014-6262.json b/2014/6xxx/CVE-2014-6262.json index 700d3928646..1f974acbb5d 100644 --- a/2014/6xxx/CVE-2014-6262.json +++ b/2014/6xxx/CVE-2014-6262.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200301 [SECURITY] [DLA 2131-1] rrdtool security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00000.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2131-2] rrdtool regression update", + "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00003.html" } ] } diff --git a/2018/19xxx/CVE-2018-19798.json b/2018/19xxx/CVE-2018-19798.json index 78ef1b42c27..9dd16a9d3c1 100644 --- a/2018/19xxx/CVE-2018-19798.json +++ b/2018/19xxx/CVE-2018-19798.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19798", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fleetco Fleet Maintenance Management (FMM) 1.2 and earlier allows uploading an arbitrary \".php\" file with the application/x-php Content-Type to the accidents_add.php?submit=1 URI, as demonstrated by the value_Images_1 field, which leads to remote command execution on the remote server. Any authenticated user can exploit this." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "EXPLOIT-DB", + "name": "45927", + "url": "https://exploit-db.com/exploits/45927" } ] } diff --git a/2018/20xxx/CVE-2018-20343.json b/2018/20xxx/CVE-2018-20343.json index 1e73fc34b93..e6a1f2d16ff 100644 --- a/2018/20xxx/CVE-2018-20343.json +++ b/2018/20xxx/CVE-2018-20343.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20343", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build Engine 1. An attacker could craft a special map file to execute arbitrary code when the map file is loaded." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Alexandre-Bartel/CVE-2018-20343", + "refsource": "MISC", + "name": "https://github.com/Alexandre-Bartel/CVE-2018-20343" } ] } diff --git a/2019/14xxx/CVE-2019-14615.json b/2019/14xxx/CVE-2019-14615.json index 7839a9adfa8..7c3fc6e7d51 100644 --- a/2019/14xxx/CVE-2019-14615.json +++ b/2019/14xxx/CVE-2019-14615.json @@ -113,6 +113,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] }, diff --git a/2019/14xxx/CVE-2019-14893.json b/2019/14xxx/CVE-2019-14893.json index c61cd8a0178..49574378bcb 100644 --- a/2019/14xxx/CVE-2019-14893.json +++ b/2019/14xxx/CVE-2019-14893.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14893", - "ASSIGNER": "gsuckevi@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/15xxx/CVE-2019-15099.json b/2019/15xxx/CVE-2019-15099.json index 1aaf316bab3..f8a6f8997fc 100644 --- a/2019/15xxx/CVE-2019-15099.json +++ b/2019/15xxx/CVE-2019-15099.json @@ -91,6 +91,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/15xxx/CVE-2019-15291.json b/2019/15xxx/CVE-2019-15291.json index 3e9ecea0185..c76c7f9c928 100644 --- a/2019/15xxx/CVE-2019-15291.json +++ b/2019/15xxx/CVE-2019-15291.json @@ -126,6 +126,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/16xxx/CVE-2019-16229.json b/2019/16xxx/CVE-2019-16229.json index 39340fe7fec..4ef985c6011 100644 --- a/2019/16xxx/CVE-2019-16229.json +++ b/2019/16xxx/CVE-2019-16229.json @@ -81,6 +81,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/16xxx/CVE-2019-16232.json b/2019/16xxx/CVE-2019-16232.json index 7a12ad00b0b..9e017364395 100644 --- a/2019/16xxx/CVE-2019-16232.json +++ b/2019/16xxx/CVE-2019-16232.json @@ -96,6 +96,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/18xxx/CVE-2019-18683.json b/2019/18xxx/CVE-2019-18683.json index 273810dabd6..c43266dd43e 100644 --- a/2019/18xxx/CVE-2019-18683.json +++ b/2019/18xxx/CVE-2019-18683.json @@ -116,6 +116,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/18xxx/CVE-2019-18786.json b/2019/18xxx/CVE-2019-18786.json index c195cde9121..2ac313f5cd9 100644 --- a/2019/18xxx/CVE-2019-18786.json +++ b/2019/18xxx/CVE-2019-18786.json @@ -71,6 +71,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/18xxx/CVE-2019-18811.json b/2019/18xxx/CVE-2019-18811.json index f7e2d7f7cce..b9e4a8a4ab3 100644 --- a/2019/18xxx/CVE-2019-18811.json +++ b/2019/18xxx/CVE-2019-18811.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-124a241044", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19050.json b/2019/19xxx/CVE-2019-19050.json index 17345e3aa4a..fe6254f149b 100644 --- a/2019/19xxx/CVE-2019-19050.json +++ b/2019/19xxx/CVE-2019-19050.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html", "url": "http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19057.json b/2019/19xxx/CVE-2019-19057.json index 5ae1884ec16..0dc5a64da3d 100644 --- a/2019/19xxx/CVE-2019-19057.json +++ b/2019/19xxx/CVE-2019-19057.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19062.json b/2019/19xxx/CVE-2019-19062.json index 77f5d27e0ef..c28ef0231af 100644 --- a/2019/19xxx/CVE-2019-19062.json +++ b/2019/19xxx/CVE-2019-19062.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19063.json b/2019/19xxx/CVE-2019-19063.json index 981f60ac743..976f5a5383e 100644 --- a/2019/19xxx/CVE-2019-19063.json +++ b/2019/19xxx/CVE-2019-19063.json @@ -111,6 +111,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19071.json b/2019/19xxx/CVE-2019-19071.json index e8f662bd40c..7329e5ad7d7 100644 --- a/2019/19xxx/CVE-2019-19071.json +++ b/2019/19xxx/CVE-2019-19071.json @@ -86,6 +86,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19077.json b/2019/19xxx/CVE-2019-19077.json index 93602670824..406976f0c43 100644 --- a/2019/19xxx/CVE-2019-19077.json +++ b/2019/19xxx/CVE-2019-19077.json @@ -71,6 +71,11 @@ "refsource": "UBUNTU", "name": "USN-4258-1", "url": "https://usn.ubuntu.com/4258-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19078.json b/2019/19xxx/CVE-2019-19078.json index 77309334a44..38dbbcd8fa6 100644 --- a/2019/19xxx/CVE-2019-19078.json +++ b/2019/19xxx/CVE-2019-19078.json @@ -91,6 +91,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19082.json b/2019/19xxx/CVE-2019-19082.json index 9f5f24341be..bc48aab6231 100644 --- a/2019/19xxx/CVE-2019-19082.json +++ b/2019/19xxx/CVE-2019-19082.json @@ -81,6 +81,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19241.json b/2019/19xxx/CVE-2019-19241.json index bc7e0681e37..7dae122a9d0 100644 --- a/2019/19xxx/CVE-2019-19241.json +++ b/2019/19xxx/CVE-2019-19241.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200103-0001/", "url": "https://security.netapp.com/advisory/ntap-20200103-0001/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19252.json b/2019/19xxx/CVE-2019-19252.json index a1e4b065529..b9a8b62af24 100644 --- a/2019/19xxx/CVE-2019-19252.json +++ b/2019/19xxx/CVE-2019-19252.json @@ -71,6 +71,11 @@ "refsource": "UBUNTU", "name": "USN-4258-1", "url": "https://usn.ubuntu.com/4258-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19332.json b/2019/19xxx/CVE-2019-19332.json index 7cdc684440e..e519b11d34b 100644 --- a/2019/19xxx/CVE-2019-19332.json +++ b/2019/19xxx/CVE-2019-19332.json @@ -103,6 +103,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] }, diff --git a/2019/19xxx/CVE-2019-19602.json b/2019/19xxx/CVE-2019-19602.json index a1b6e3f6874..91945c14b37 100644 --- a/2019/19xxx/CVE-2019-19602.json +++ b/2019/19xxx/CVE-2019-19602.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200103-0001/", "url": "https://security.netapp.com/advisory/ntap-20200103-0001/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19767.json b/2019/19xxx/CVE-2019-19767.json index 85184ef15b7..d3a7e901585 100644 --- a/2019/19xxx/CVE-2019-19767.json +++ b/2019/19xxx/CVE-2019-19767.json @@ -106,6 +106,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19947.json b/2019/19xxx/CVE-2019-19947.json index aa8833ce4bc..7bc6441ade4 100644 --- a/2019/19xxx/CVE-2019-19947.json +++ b/2019/19xxx/CVE-2019-19947.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2019/19xxx/CVE-2019-19965.json b/2019/19xxx/CVE-2019-19965.json index ae157e0bfb8..5ba10b16cb3 100644 --- a/2019/19xxx/CVE-2019-19965.json +++ b/2019/19xxx/CVE-2019-19965.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4284-1", + "url": "https://usn.ubuntu.com/4284-1/" } ] } diff --git a/2020/9xxx/CVE-2020-9273.json b/2020/9xxx/CVE-2020-9273.json index 70fd3cc2e54..3bbab18afc5 100644 --- a/2020/9xxx/CVE-2020-9273.json +++ b/2020/9xxx/CVE-2020-9273.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0273", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2115-2] proftpd-dfsg regression update", + "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html" } ] } diff --git a/2020/9xxx/CVE-2020-9767.json b/2020/9xxx/CVE-2020-9767.json new file mode 100644 index 00000000000..1fa69597bee --- /dev/null +++ b/2020/9xxx/CVE-2020-9767.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9767", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file