From 94f46885434d69dc2111dc6f042be2eddcf9894d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 14 Jan 2020 14:01:07 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/9xxx/CVE-2014-9211.json | 53 +++++++++++++++++++++++++++-- 2020/5xxx/CVE-2020-5194.json | 61 +++++++++++++++++++++++++++++---- 2020/5xxx/CVE-2020-5196.json | 66 ++++++++++++++++++++++++++++++++---- 2020/6xxx/CVE-2020-6959.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6960.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6961.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6962.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6963.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6964.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6965.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6966.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6967.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6968.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6969.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6970.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6971.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6972.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6973.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6974.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6975.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6976.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6977.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6978.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6979.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6980.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6981.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6982.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6983.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6984.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6985.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6986.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6987.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6988.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6989.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6990.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6991.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6992.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6993.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6994.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6995.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6996.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6997.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6998.json | 18 ++++++++++ 2020/6xxx/CVE-2020-6999.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7000.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7001.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7002.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7003.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7004.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7005.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7006.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7007.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7008.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7009.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7010.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7011.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7012.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7013.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7014.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7015.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7016.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7017.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7018.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7019.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7020.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7021.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7022.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7023.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7024.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7025.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7026.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7027.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7028.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7029.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7030.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7031.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7032.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7033.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7034.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7035.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7036.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7037.json | 18 ++++++++++ 2020/7xxx/CVE-2020-7038.json | 18 ++++++++++ 83 files changed, 1606 insertions(+), 14 deletions(-) create mode 100644 2020/6xxx/CVE-2020-6959.json create mode 100644 2020/6xxx/CVE-2020-6960.json create mode 100644 2020/6xxx/CVE-2020-6961.json create mode 100644 2020/6xxx/CVE-2020-6962.json create mode 100644 2020/6xxx/CVE-2020-6963.json create mode 100644 2020/6xxx/CVE-2020-6964.json create mode 100644 2020/6xxx/CVE-2020-6965.json create mode 100644 2020/6xxx/CVE-2020-6966.json create mode 100644 2020/6xxx/CVE-2020-6967.json create mode 100644 2020/6xxx/CVE-2020-6968.json create mode 100644 2020/6xxx/CVE-2020-6969.json create mode 100644 2020/6xxx/CVE-2020-6970.json create mode 100644 2020/6xxx/CVE-2020-6971.json create mode 100644 2020/6xxx/CVE-2020-6972.json create mode 100644 2020/6xxx/CVE-2020-6973.json create mode 100644 2020/6xxx/CVE-2020-6974.json create mode 100644 2020/6xxx/CVE-2020-6975.json create mode 100644 2020/6xxx/CVE-2020-6976.json create mode 100644 2020/6xxx/CVE-2020-6977.json create mode 100644 2020/6xxx/CVE-2020-6978.json create mode 100644 2020/6xxx/CVE-2020-6979.json create mode 100644 2020/6xxx/CVE-2020-6980.json create mode 100644 2020/6xxx/CVE-2020-6981.json create mode 100644 2020/6xxx/CVE-2020-6982.json create mode 100644 2020/6xxx/CVE-2020-6983.json create mode 100644 2020/6xxx/CVE-2020-6984.json create mode 100644 2020/6xxx/CVE-2020-6985.json create mode 100644 2020/6xxx/CVE-2020-6986.json create mode 100644 2020/6xxx/CVE-2020-6987.json create mode 100644 2020/6xxx/CVE-2020-6988.json create mode 100644 2020/6xxx/CVE-2020-6989.json create mode 100644 2020/6xxx/CVE-2020-6990.json create mode 100644 2020/6xxx/CVE-2020-6991.json create mode 100644 2020/6xxx/CVE-2020-6992.json create mode 100644 2020/6xxx/CVE-2020-6993.json create mode 100644 2020/6xxx/CVE-2020-6994.json create mode 100644 2020/6xxx/CVE-2020-6995.json create mode 100644 2020/6xxx/CVE-2020-6996.json create mode 100644 2020/6xxx/CVE-2020-6997.json create mode 100644 2020/6xxx/CVE-2020-6998.json create mode 100644 2020/6xxx/CVE-2020-6999.json create mode 100644 2020/7xxx/CVE-2020-7000.json create mode 100644 2020/7xxx/CVE-2020-7001.json create mode 100644 2020/7xxx/CVE-2020-7002.json create mode 100644 2020/7xxx/CVE-2020-7003.json create mode 100644 2020/7xxx/CVE-2020-7004.json create mode 100644 2020/7xxx/CVE-2020-7005.json create mode 100644 2020/7xxx/CVE-2020-7006.json create mode 100644 2020/7xxx/CVE-2020-7007.json create mode 100644 2020/7xxx/CVE-2020-7008.json create mode 100644 2020/7xxx/CVE-2020-7009.json create mode 100644 2020/7xxx/CVE-2020-7010.json create mode 100644 2020/7xxx/CVE-2020-7011.json create mode 100644 2020/7xxx/CVE-2020-7012.json create mode 100644 2020/7xxx/CVE-2020-7013.json create mode 100644 2020/7xxx/CVE-2020-7014.json create mode 100644 2020/7xxx/CVE-2020-7015.json create mode 100644 2020/7xxx/CVE-2020-7016.json create mode 100644 2020/7xxx/CVE-2020-7017.json create mode 100644 2020/7xxx/CVE-2020-7018.json create mode 100644 2020/7xxx/CVE-2020-7019.json create mode 100644 2020/7xxx/CVE-2020-7020.json create mode 100644 2020/7xxx/CVE-2020-7021.json create mode 100644 2020/7xxx/CVE-2020-7022.json create mode 100644 2020/7xxx/CVE-2020-7023.json create mode 100644 2020/7xxx/CVE-2020-7024.json create mode 100644 2020/7xxx/CVE-2020-7025.json create mode 100644 2020/7xxx/CVE-2020-7026.json create mode 100644 2020/7xxx/CVE-2020-7027.json create mode 100644 2020/7xxx/CVE-2020-7028.json create mode 100644 2020/7xxx/CVE-2020-7029.json create mode 100644 2020/7xxx/CVE-2020-7030.json create mode 100644 2020/7xxx/CVE-2020-7031.json create mode 100644 2020/7xxx/CVE-2020-7032.json create mode 100644 2020/7xxx/CVE-2020-7033.json create mode 100644 2020/7xxx/CVE-2020-7034.json create mode 100644 2020/7xxx/CVE-2020-7035.json create mode 100644 2020/7xxx/CVE-2020-7036.json create mode 100644 2020/7xxx/CVE-2020-7037.json create mode 100644 2020/7xxx/CVE-2020-7038.json diff --git a/2014/9xxx/CVE-2014-9211.json b/2014/9xxx/CVE-2014-9211.json index c7faffe8be1..08ef697c9dc 100644 --- a/2014/9xxx/CVE-2014-9211.json +++ b/2014/9xxx/CVE-2014-9211.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9211", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ClickDesk version 4.3 and below has persistent cross site scripting" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.securityfocus.com/bid/65971", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/65971" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/author/11084/", + "url": "https://packetstormsecurity.com/files/author/11084/" } ] } diff --git a/2020/5xxx/CVE-2020-5194.json b/2020/5xxx/CVE-2020-5194.json index f4e5568659d..d39de8cc0e6 100644 --- a/2020/5xxx/CVE-2020-5194.json +++ b/2020/5xxx/CVE-2020-5194.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-5194", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-5194", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The zip API endpoint in Cerberus FTP Server 8 allows an authenticated attacker without zip permission to use the zip functionality via an unrestricted API endpoint. Improper permission verification occurs when calling the file/ajax_download_zip/zip_name endpoint. The result is that a user without permissions can zip and download files even if they do not have permission to view whether the file exists." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements", + "refsource": "MISC", + "name": "https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements" + }, + { + "refsource": "MISC", + "name": "https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities", + "url": "https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities" } ] } diff --git a/2020/5xxx/CVE-2020-5196.json b/2020/5xxx/CVE-2020-5196.json index 1790c84d960..48820c82913 100644 --- a/2020/5xxx/CVE-2020-5196.json +++ b/2020/5xxx/CVE-2020-5196.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-5196", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-5196", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cerberus FTP Server Enterprise Edition prior to versions 11.0.3 and 10.0.18 allows an authenticated attacker to create files, display hidden files, list directories, and list files without the permission to zip and download (or unzip and upload) files. There are multiple ways to bypass certain permissions by utilizing the zip and unzip features. As a result, users without permission can see files, folders, and hidden files, and can create directories without permission." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements", + "refsource": "MISC", + "name": "https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements" + }, + { + "refsource": "MISC", + "name": "https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities", + "url": "https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities" + }, + { + "refsource": "MISC", + "name": "https://www.cerberusftp.com/zip-unzip-permission-bypass-vulnerability-fixed-in-cerberus-ftp-server-versions-11-0-3-and-10-0-18/", + "url": "https://www.cerberusftp.com/zip-unzip-permission-bypass-vulnerability-fixed-in-cerberus-ftp-server-versions-11-0-3-and-10-0-18/" } ] } diff --git a/2020/6xxx/CVE-2020-6959.json b/2020/6xxx/CVE-2020-6959.json new file mode 100644 index 00000000000..ed743b88aa6 --- /dev/null +++ b/2020/6xxx/CVE-2020-6959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6960.json b/2020/6xxx/CVE-2020-6960.json new file mode 100644 index 00000000000..3c4e0ae98c3 --- /dev/null +++ b/2020/6xxx/CVE-2020-6960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6961.json b/2020/6xxx/CVE-2020-6961.json new file mode 100644 index 00000000000..09442999c0a --- /dev/null +++ b/2020/6xxx/CVE-2020-6961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6962.json b/2020/6xxx/CVE-2020-6962.json new file mode 100644 index 00000000000..c1f032a8ed1 --- /dev/null +++ b/2020/6xxx/CVE-2020-6962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6963.json b/2020/6xxx/CVE-2020-6963.json new file mode 100644 index 00000000000..907a05b87c2 --- /dev/null +++ b/2020/6xxx/CVE-2020-6963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6964.json b/2020/6xxx/CVE-2020-6964.json new file mode 100644 index 00000000000..c8990f06e3f --- /dev/null +++ b/2020/6xxx/CVE-2020-6964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6965.json b/2020/6xxx/CVE-2020-6965.json new file mode 100644 index 00000000000..0a53db0dd38 --- /dev/null +++ b/2020/6xxx/CVE-2020-6965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6966.json b/2020/6xxx/CVE-2020-6966.json new file mode 100644 index 00000000000..a26fa98a6a6 --- /dev/null +++ b/2020/6xxx/CVE-2020-6966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6967.json b/2020/6xxx/CVE-2020-6967.json new file mode 100644 index 00000000000..dc91cebb83d --- /dev/null +++ b/2020/6xxx/CVE-2020-6967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6968.json b/2020/6xxx/CVE-2020-6968.json new file mode 100644 index 00000000000..f7d07456c20 --- /dev/null +++ b/2020/6xxx/CVE-2020-6968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6969.json b/2020/6xxx/CVE-2020-6969.json new file mode 100644 index 00000000000..2d55439c0dd --- /dev/null +++ b/2020/6xxx/CVE-2020-6969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6970.json b/2020/6xxx/CVE-2020-6970.json new file mode 100644 index 00000000000..d0e520f40e6 --- /dev/null +++ b/2020/6xxx/CVE-2020-6970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6971.json b/2020/6xxx/CVE-2020-6971.json new file mode 100644 index 00000000000..d2f712f67c0 --- /dev/null +++ b/2020/6xxx/CVE-2020-6971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6972.json b/2020/6xxx/CVE-2020-6972.json new file mode 100644 index 00000000000..cd76b5b354e --- /dev/null +++ b/2020/6xxx/CVE-2020-6972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6973.json b/2020/6xxx/CVE-2020-6973.json new file mode 100644 index 00000000000..d6bb6f1eaed --- /dev/null +++ b/2020/6xxx/CVE-2020-6973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6974.json b/2020/6xxx/CVE-2020-6974.json new file mode 100644 index 00000000000..4435e0b2099 --- /dev/null +++ b/2020/6xxx/CVE-2020-6974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6975.json b/2020/6xxx/CVE-2020-6975.json new file mode 100644 index 00000000000..1c7fc00d56d --- /dev/null +++ b/2020/6xxx/CVE-2020-6975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6976.json b/2020/6xxx/CVE-2020-6976.json new file mode 100644 index 00000000000..92df4487579 --- /dev/null +++ b/2020/6xxx/CVE-2020-6976.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6976", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6977.json b/2020/6xxx/CVE-2020-6977.json new file mode 100644 index 00000000000..3b6da9ce0e0 --- /dev/null +++ b/2020/6xxx/CVE-2020-6977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6978.json b/2020/6xxx/CVE-2020-6978.json new file mode 100644 index 00000000000..ec1419552fc --- /dev/null +++ b/2020/6xxx/CVE-2020-6978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6979.json b/2020/6xxx/CVE-2020-6979.json new file mode 100644 index 00000000000..7e9b39749fb --- /dev/null +++ b/2020/6xxx/CVE-2020-6979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6980.json b/2020/6xxx/CVE-2020-6980.json new file mode 100644 index 00000000000..ee880b02bc4 --- /dev/null +++ b/2020/6xxx/CVE-2020-6980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6981.json b/2020/6xxx/CVE-2020-6981.json new file mode 100644 index 00000000000..9b117f7cf74 --- /dev/null +++ b/2020/6xxx/CVE-2020-6981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6982.json b/2020/6xxx/CVE-2020-6982.json new file mode 100644 index 00000000000..ce966e804a2 --- /dev/null +++ b/2020/6xxx/CVE-2020-6982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6983.json b/2020/6xxx/CVE-2020-6983.json new file mode 100644 index 00000000000..ea6abfcaa61 --- /dev/null +++ b/2020/6xxx/CVE-2020-6983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6984.json b/2020/6xxx/CVE-2020-6984.json new file mode 100644 index 00000000000..be2201da4bf --- /dev/null +++ b/2020/6xxx/CVE-2020-6984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6985.json b/2020/6xxx/CVE-2020-6985.json new file mode 100644 index 00000000000..72382b17dfa --- /dev/null +++ b/2020/6xxx/CVE-2020-6985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6986.json b/2020/6xxx/CVE-2020-6986.json new file mode 100644 index 00000000000..1ff9d0ccf1b --- /dev/null +++ b/2020/6xxx/CVE-2020-6986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6987.json b/2020/6xxx/CVE-2020-6987.json new file mode 100644 index 00000000000..34f2b82cbc5 --- /dev/null +++ b/2020/6xxx/CVE-2020-6987.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6987", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6988.json b/2020/6xxx/CVE-2020-6988.json new file mode 100644 index 00000000000..83979b85986 --- /dev/null +++ b/2020/6xxx/CVE-2020-6988.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6988", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6989.json b/2020/6xxx/CVE-2020-6989.json new file mode 100644 index 00000000000..120fb0f25e1 --- /dev/null +++ b/2020/6xxx/CVE-2020-6989.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6989", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6990.json b/2020/6xxx/CVE-2020-6990.json new file mode 100644 index 00000000000..b8895564d4d --- /dev/null +++ b/2020/6xxx/CVE-2020-6990.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6990", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6991.json b/2020/6xxx/CVE-2020-6991.json new file mode 100644 index 00000000000..dbd0d4e9f8d --- /dev/null +++ b/2020/6xxx/CVE-2020-6991.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6991", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6992.json b/2020/6xxx/CVE-2020-6992.json new file mode 100644 index 00000000000..8e2bdf89727 --- /dev/null +++ b/2020/6xxx/CVE-2020-6992.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6992", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6993.json b/2020/6xxx/CVE-2020-6993.json new file mode 100644 index 00000000000..2b9c5045a56 --- /dev/null +++ b/2020/6xxx/CVE-2020-6993.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6993", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6994.json b/2020/6xxx/CVE-2020-6994.json new file mode 100644 index 00000000000..2ee16e3586d --- /dev/null +++ b/2020/6xxx/CVE-2020-6994.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6994", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6995.json b/2020/6xxx/CVE-2020-6995.json new file mode 100644 index 00000000000..94ba54567d1 --- /dev/null +++ b/2020/6xxx/CVE-2020-6995.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6995", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6996.json b/2020/6xxx/CVE-2020-6996.json new file mode 100644 index 00000000000..db0f6e2584f --- /dev/null +++ b/2020/6xxx/CVE-2020-6996.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6996", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6997.json b/2020/6xxx/CVE-2020-6997.json new file mode 100644 index 00000000000..3b0d8a35beb --- /dev/null +++ b/2020/6xxx/CVE-2020-6997.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6997", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6998.json b/2020/6xxx/CVE-2020-6998.json new file mode 100644 index 00000000000..66027bfa617 --- /dev/null +++ b/2020/6xxx/CVE-2020-6998.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6998", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6999.json b/2020/6xxx/CVE-2020-6999.json new file mode 100644 index 00000000000..ffc71fe75a1 --- /dev/null +++ b/2020/6xxx/CVE-2020-6999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7000.json b/2020/7xxx/CVE-2020-7000.json new file mode 100644 index 00000000000..318b113b67c --- /dev/null +++ b/2020/7xxx/CVE-2020-7000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7001.json b/2020/7xxx/CVE-2020-7001.json new file mode 100644 index 00000000000..adb8dc30ad1 --- /dev/null +++ b/2020/7xxx/CVE-2020-7001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7002.json b/2020/7xxx/CVE-2020-7002.json new file mode 100644 index 00000000000..b87db4d9b1f --- /dev/null +++ b/2020/7xxx/CVE-2020-7002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7003.json b/2020/7xxx/CVE-2020-7003.json new file mode 100644 index 00000000000..a02097847b2 --- /dev/null +++ b/2020/7xxx/CVE-2020-7003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7004.json b/2020/7xxx/CVE-2020-7004.json new file mode 100644 index 00000000000..ab31f85c24a --- /dev/null +++ b/2020/7xxx/CVE-2020-7004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7005.json b/2020/7xxx/CVE-2020-7005.json new file mode 100644 index 00000000000..bf401e4b649 --- /dev/null +++ b/2020/7xxx/CVE-2020-7005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7006.json b/2020/7xxx/CVE-2020-7006.json new file mode 100644 index 00000000000..0c024fd2279 --- /dev/null +++ b/2020/7xxx/CVE-2020-7006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7007.json b/2020/7xxx/CVE-2020-7007.json new file mode 100644 index 00000000000..4df8d592ae1 --- /dev/null +++ b/2020/7xxx/CVE-2020-7007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7008.json b/2020/7xxx/CVE-2020-7008.json new file mode 100644 index 00000000000..42d4f722cb0 --- /dev/null +++ b/2020/7xxx/CVE-2020-7008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7009.json b/2020/7xxx/CVE-2020-7009.json new file mode 100644 index 00000000000..9809d6dfde2 --- /dev/null +++ b/2020/7xxx/CVE-2020-7009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7010.json b/2020/7xxx/CVE-2020-7010.json new file mode 100644 index 00000000000..2f36bbb948c --- /dev/null +++ b/2020/7xxx/CVE-2020-7010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7011.json b/2020/7xxx/CVE-2020-7011.json new file mode 100644 index 00000000000..0458078d163 --- /dev/null +++ b/2020/7xxx/CVE-2020-7011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7012.json b/2020/7xxx/CVE-2020-7012.json new file mode 100644 index 00000000000..35e1ea5c7d0 --- /dev/null +++ b/2020/7xxx/CVE-2020-7012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7013.json b/2020/7xxx/CVE-2020-7013.json new file mode 100644 index 00000000000..9d3768df8e7 --- /dev/null +++ b/2020/7xxx/CVE-2020-7013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7014.json b/2020/7xxx/CVE-2020-7014.json new file mode 100644 index 00000000000..a6288862908 --- /dev/null +++ b/2020/7xxx/CVE-2020-7014.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7014", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7015.json b/2020/7xxx/CVE-2020-7015.json new file mode 100644 index 00000000000..8d321ca3845 --- /dev/null +++ b/2020/7xxx/CVE-2020-7015.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7015", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7016.json b/2020/7xxx/CVE-2020-7016.json new file mode 100644 index 00000000000..b59e0e1a9b6 --- /dev/null +++ b/2020/7xxx/CVE-2020-7016.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7016", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7017.json b/2020/7xxx/CVE-2020-7017.json new file mode 100644 index 00000000000..f008e79af7c --- /dev/null +++ b/2020/7xxx/CVE-2020-7017.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7017", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7018.json b/2020/7xxx/CVE-2020-7018.json new file mode 100644 index 00000000000..c172a92f464 --- /dev/null +++ b/2020/7xxx/CVE-2020-7018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7019.json b/2020/7xxx/CVE-2020-7019.json new file mode 100644 index 00000000000..bc2321ca583 --- /dev/null +++ b/2020/7xxx/CVE-2020-7019.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7019", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7020.json b/2020/7xxx/CVE-2020-7020.json new file mode 100644 index 00000000000..1f0d2b1f9a8 --- /dev/null +++ b/2020/7xxx/CVE-2020-7020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7021.json b/2020/7xxx/CVE-2020-7021.json new file mode 100644 index 00000000000..1cfdb93009b --- /dev/null +++ b/2020/7xxx/CVE-2020-7021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7022.json b/2020/7xxx/CVE-2020-7022.json new file mode 100644 index 00000000000..a3430bda1ce --- /dev/null +++ b/2020/7xxx/CVE-2020-7022.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7022", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7023.json b/2020/7xxx/CVE-2020-7023.json new file mode 100644 index 00000000000..16810c2ee20 --- /dev/null +++ b/2020/7xxx/CVE-2020-7023.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7023", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7024.json b/2020/7xxx/CVE-2020-7024.json new file mode 100644 index 00000000000..1139f545007 --- /dev/null +++ b/2020/7xxx/CVE-2020-7024.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7024", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7025.json b/2020/7xxx/CVE-2020-7025.json new file mode 100644 index 00000000000..ba39c559d84 --- /dev/null +++ b/2020/7xxx/CVE-2020-7025.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7025", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7026.json b/2020/7xxx/CVE-2020-7026.json new file mode 100644 index 00000000000..74cb1cf3214 --- /dev/null +++ b/2020/7xxx/CVE-2020-7026.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7026", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7027.json b/2020/7xxx/CVE-2020-7027.json new file mode 100644 index 00000000000..32d26142396 --- /dev/null +++ b/2020/7xxx/CVE-2020-7027.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7027", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7028.json b/2020/7xxx/CVE-2020-7028.json new file mode 100644 index 00000000000..611c41597d2 --- /dev/null +++ b/2020/7xxx/CVE-2020-7028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7029.json b/2020/7xxx/CVE-2020-7029.json new file mode 100644 index 00000000000..a4d7a582686 --- /dev/null +++ b/2020/7xxx/CVE-2020-7029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7030.json b/2020/7xxx/CVE-2020-7030.json new file mode 100644 index 00000000000..a70ade5ec75 --- /dev/null +++ b/2020/7xxx/CVE-2020-7030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7031.json b/2020/7xxx/CVE-2020-7031.json new file mode 100644 index 00000000000..acea84e1473 --- /dev/null +++ b/2020/7xxx/CVE-2020-7031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7032.json b/2020/7xxx/CVE-2020-7032.json new file mode 100644 index 00000000000..118ec9d8752 --- /dev/null +++ b/2020/7xxx/CVE-2020-7032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7033.json b/2020/7xxx/CVE-2020-7033.json new file mode 100644 index 00000000000..8dd3ce33eaf --- /dev/null +++ b/2020/7xxx/CVE-2020-7033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7034.json b/2020/7xxx/CVE-2020-7034.json new file mode 100644 index 00000000000..e3b340d61e2 --- /dev/null +++ b/2020/7xxx/CVE-2020-7034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7035.json b/2020/7xxx/CVE-2020-7035.json new file mode 100644 index 00000000000..40c9a0c263b --- /dev/null +++ b/2020/7xxx/CVE-2020-7035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7036.json b/2020/7xxx/CVE-2020-7036.json new file mode 100644 index 00000000000..de1501b6679 --- /dev/null +++ b/2020/7xxx/CVE-2020-7036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7037.json b/2020/7xxx/CVE-2020-7037.json new file mode 100644 index 00000000000..0329501586e --- /dev/null +++ b/2020/7xxx/CVE-2020-7037.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7037", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7038.json b/2020/7xxx/CVE-2020-7038.json new file mode 100644 index 00000000000..a794aaf51bf --- /dev/null +++ b/2020/7xxx/CVE-2020-7038.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7038", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file