diff --git a/2020/16xxx/CVE-2020-16135.json b/2020/16xxx/CVE-2020-16135.json index 20a6ef3f63d..34d3adb3b13 100644 --- a/2020/16xxx/CVE-2020-16135.json +++ b/2020/16xxx/CVE-2020-16135.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200731 [SECURITY] [DLA 2303-1] libssh security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00034.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4447-1", + "url": "https://usn.ubuntu.com/4447-1/" } ] } diff --git a/2020/16xxx/CVE-2020-16207.json b/2020/16xxx/CVE-2020-16207.json index 3dbe3639866..f2ab528a503 100644 --- a/2020/16xxx/CVE-2020-16207.json +++ b/2020/16xxx/CVE-2020-16207.json @@ -48,6 +48,31 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-959/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-959/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-958/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-958/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-951/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-951/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-955/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-955/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-950/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-950/" } ] }, diff --git a/2020/16xxx/CVE-2020-16211.json b/2020/16xxx/CVE-2020-16211.json index 0e2ae7e94c4..06ff281bf9d 100644 --- a/2020/16xxx/CVE-2020-16211.json +++ b/2020/16xxx/CVE-2020-16211.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-957/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-957/" } ] }, diff --git a/2020/16xxx/CVE-2020-16213.json b/2020/16xxx/CVE-2020-16213.json index 0bda28467e3..1526a93af34 100644 --- a/2020/16xxx/CVE-2020-16213.json +++ b/2020/16xxx/CVE-2020-16213.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-956/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-956/" } ] }, diff --git a/2020/16xxx/CVE-2020-16215.json b/2020/16xxx/CVE-2020-16215.json index abbb4b24cc9..9350e42ea0f 100644 --- a/2020/16xxx/CVE-2020-16215.json +++ b/2020/16xxx/CVE-2020-16215.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-953/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-953/" } ] }, diff --git a/2020/16xxx/CVE-2020-16217.json b/2020/16xxx/CVE-2020-16217.json index d54991c92b4..6ea3a994e6e 100644 --- a/2020/16xxx/CVE-2020-16217.json +++ b/2020/16xxx/CVE-2020-16217.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-952/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-952/" } ] }, diff --git a/2020/16xxx/CVE-2020-16229.json b/2020/16xxx/CVE-2020-16229.json index c7fdc2ac214..d47ca38ca04 100644 --- a/2020/16xxx/CVE-2020-16229.json +++ b/2020/16xxx/CVE-2020-16229.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-954/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-954/" } ] }, diff --git a/2020/17xxx/CVE-2020-17471.json b/2020/17xxx/CVE-2020-17471.json new file mode 100644 index 00000000000..17a35a329e6 --- /dev/null +++ b/2020/17xxx/CVE-2020-17471.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17471", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17472.json b/2020/17xxx/CVE-2020-17472.json new file mode 100644 index 00000000000..302d2ca95b4 --- /dev/null +++ b/2020/17xxx/CVE-2020-17472.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17472", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17473.json b/2020/17xxx/CVE-2020-17473.json new file mode 100644 index 00000000000..8eeb010fe2c --- /dev/null +++ b/2020/17xxx/CVE-2020-17473.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17473", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17474.json b/2020/17xxx/CVE-2020-17474.json new file mode 100644 index 00000000000..669b22d52ca --- /dev/null +++ b/2020/17xxx/CVE-2020-17474.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17474", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17475.json b/2020/17xxx/CVE-2020-17475.json new file mode 100644 index 00000000000..ce682120665 --- /dev/null +++ b/2020/17xxx/CVE-2020-17475.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17475", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17476.json b/2020/17xxx/CVE-2020-17476.json new file mode 100644 index 00000000000..a9572cf07f5 --- /dev/null +++ b/2020/17xxx/CVE-2020-17476.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-17476", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Mibew Messenger before 3.2.7 allows XSS via a crafted user name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://mibew.org/announcements/2020/07/09/mibew-messenger-3-2-7-has-been-released", + "refsource": "MISC", + "name": "https://mibew.org/announcements/2020/07/09/mibew-messenger-3-2-7-has-been-released" + }, + { + "url": "https://github.com/Mibew/mibew/commit/84f5bca0a90b2fe470e35e9b5121548ccce0093c", + "refsource": "MISC", + "name": "https://github.com/Mibew/mibew/commit/84f5bca0a90b2fe470e35e9b5121548ccce0093c" + } + ] + } +} \ No newline at end of file