From 954eccbe8e1e490a4869d99ee17848ad7f76e51d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 30 Dec 2019 17:03:03 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10774.json | 50 +++++++++++++++++-- 2019/17xxx/CVE-2019-17558.json | 62 ++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17621.json | 87 ++++++++++++++++++++++++++++++++++ 2019/20xxx/CVE-2019-20140.json | 62 ++++++++++++++++++++++++ 2019/20xxx/CVE-2019-20141.json | 58 +++-------------------- 2019/4xxx/CVE-2019-4763.json | 14 +++--- 2019/4xxx/CVE-2019-4764.json | 14 +++--- 2019/4xxx/CVE-2019-4765.json | 14 +++--- 2019/4xxx/CVE-2019-4766.json | 14 +++--- 2019/5xxx/CVE-2019-5001.json | 14 +++--- 2019/5xxx/CVE-2019-5002.json | 14 +++--- 2019/5xxx/CVE-2019-5003.json | 14 +++--- 2020/4xxx/CVE-2020-4130.json | 18 +++++++ 2020/4xxx/CVE-2020-4131.json | 18 +++++++ 2020/4xxx/CVE-2020-4132.json | 18 +++++++ 2020/4xxx/CVE-2020-4133.json | 18 +++++++ 2020/4xxx/CVE-2020-4134.json | 18 +++++++ 2020/4xxx/CVE-2020-4135.json | 18 +++++++ 2020/4xxx/CVE-2020-4136.json | 18 +++++++ 2020/4xxx/CVE-2020-4137.json | 18 +++++++ 2020/4xxx/CVE-2020-4138.json | 18 +++++++ 2020/4xxx/CVE-2020-4373.json | 18 +++++++ 2020/4xxx/CVE-2020-4374.json | 18 +++++++ 2020/4xxx/CVE-2020-4375.json | 18 +++++++ 2020/4xxx/CVE-2020-4376.json | 18 +++++++ 2020/4xxx/CVE-2020-4377.json | 18 +++++++ 2020/4xxx/CVE-2020-4378.json | 18 +++++++ 2020/4xxx/CVE-2020-4379.json | 18 +++++++ 2020/4xxx/CVE-2020-4380.json | 18 +++++++ 2020/4xxx/CVE-2020-4381.json | 18 +++++++ 2020/4xxx/CVE-2020-4382.json | 18 +++++++ 2020/4xxx/CVE-2020-4383.json | 18 +++++++ 2020/4xxx/CVE-2020-4384.json | 18 +++++++ 2020/4xxx/CVE-2020-4385.json | 18 +++++++ 2020/4xxx/CVE-2020-4386.json | 18 +++++++ 2020/4xxx/CVE-2020-4387.json | 18 +++++++ 2020/4xxx/CVE-2020-4388.json | 18 +++++++ 2020/4xxx/CVE-2020-4389.json | 18 +++++++ 2020/4xxx/CVE-2020-4390.json | 18 +++++++ 2020/4xxx/CVE-2020-4391.json | 18 +++++++ 2020/4xxx/CVE-2020-4392.json | 18 +++++++ 2020/4xxx/CVE-2020-4393.json | 18 +++++++ 2020/4xxx/CVE-2020-4628.json | 18 +++++++ 2020/4xxx/CVE-2020-4629.json | 18 +++++++ 2020/4xxx/CVE-2020-4630.json | 18 +++++++ 2020/4xxx/CVE-2020-4631.json | 18 +++++++ 2020/4xxx/CVE-2020-4632.json | 18 +++++++ 2020/4xxx/CVE-2020-4633.json | 18 +++++++ 2020/4xxx/CVE-2020-4634.json | 18 +++++++ 2020/4xxx/CVE-2020-4635.json | 18 +++++++ 2020/4xxx/CVE-2020-4636.json | 18 +++++++ 2020/4xxx/CVE-2020-4637.json | 18 +++++++ 2020/4xxx/CVE-2020-4638.json | 18 +++++++ 2020/4xxx/CVE-2020-4639.json | 18 +++++++ 2020/4xxx/CVE-2020-4640.json | 18 +++++++ 2020/4xxx/CVE-2020-4641.json | 18 +++++++ 2020/4xxx/CVE-2020-4642.json | 18 +++++++ 2020/4xxx/CVE-2020-4643.json | 18 +++++++ 2020/4xxx/CVE-2020-4644.json | 18 +++++++ 2020/4xxx/CVE-2020-4645.json | 18 +++++++ 2020/4xxx/CVE-2020-4646.json | 18 +++++++ 2020/4xxx/CVE-2020-4647.json | 18 +++++++ 2020/4xxx/CVE-2020-4648.json | 18 +++++++ 2020/4xxx/CVE-2020-4649.json | 18 +++++++ 2020/4xxx/CVE-2020-4884.json | 18 +++++++ 2020/4xxx/CVE-2020-4885.json | 18 +++++++ 2020/4xxx/CVE-2020-4886.json | 18 +++++++ 2020/4xxx/CVE-2020-4887.json | 18 +++++++ 2020/4xxx/CVE-2020-4888.json | 18 +++++++ 2020/4xxx/CVE-2020-4889.json | 18 +++++++ 2020/4xxx/CVE-2020-4890.json | 18 +++++++ 2020/4xxx/CVE-2020-4891.json | 18 +++++++ 2020/4xxx/CVE-2020-4892.json | 18 +++++++ 2020/4xxx/CVE-2020-4893.json | 18 +++++++ 2020/4xxx/CVE-2020-4894.json | 18 +++++++ 2020/4xxx/CVE-2020-4895.json | 18 +++++++ 2020/4xxx/CVE-2020-4896.json | 18 +++++++ 2020/4xxx/CVE-2020-4897.json | 18 +++++++ 2020/4xxx/CVE-2020-4898.json | 18 +++++++ 2020/4xxx/CVE-2020-4899.json | 18 +++++++ 2020/4xxx/CVE-2020-4900.json | 18 +++++++ 2020/4xxx/CVE-2020-4901.json | 18 +++++++ 2020/4xxx/CVE-2020-4902.json | 18 +++++++ 2020/4xxx/CVE-2020-4903.json | 18 +++++++ 2020/4xxx/CVE-2020-4904.json | 18 +++++++ 2020/4xxx/CVE-2020-4905.json | 18 +++++++ 86 files changed, 1646 insertions(+), 103 deletions(-) create mode 100644 2019/17xxx/CVE-2019-17558.json create mode 100644 2019/17xxx/CVE-2019-17621.json create mode 100644 2019/20xxx/CVE-2019-20140.json create mode 100644 2020/4xxx/CVE-2020-4130.json create mode 100644 2020/4xxx/CVE-2020-4131.json create mode 100644 2020/4xxx/CVE-2020-4132.json create mode 100644 2020/4xxx/CVE-2020-4133.json create mode 100644 2020/4xxx/CVE-2020-4134.json create mode 100644 2020/4xxx/CVE-2020-4135.json create mode 100644 2020/4xxx/CVE-2020-4136.json create mode 100644 2020/4xxx/CVE-2020-4137.json create mode 100644 2020/4xxx/CVE-2020-4138.json create mode 100644 2020/4xxx/CVE-2020-4373.json create mode 100644 2020/4xxx/CVE-2020-4374.json create mode 100644 2020/4xxx/CVE-2020-4375.json create mode 100644 2020/4xxx/CVE-2020-4376.json create mode 100644 2020/4xxx/CVE-2020-4377.json create mode 100644 2020/4xxx/CVE-2020-4378.json create mode 100644 2020/4xxx/CVE-2020-4379.json create mode 100644 2020/4xxx/CVE-2020-4380.json create mode 100644 2020/4xxx/CVE-2020-4381.json create mode 100644 2020/4xxx/CVE-2020-4382.json create mode 100644 2020/4xxx/CVE-2020-4383.json create mode 100644 2020/4xxx/CVE-2020-4384.json create mode 100644 2020/4xxx/CVE-2020-4385.json create mode 100644 2020/4xxx/CVE-2020-4386.json create mode 100644 2020/4xxx/CVE-2020-4387.json create mode 100644 2020/4xxx/CVE-2020-4388.json create mode 100644 2020/4xxx/CVE-2020-4389.json create mode 100644 2020/4xxx/CVE-2020-4390.json create mode 100644 2020/4xxx/CVE-2020-4391.json create mode 100644 2020/4xxx/CVE-2020-4392.json create mode 100644 2020/4xxx/CVE-2020-4393.json create mode 100644 2020/4xxx/CVE-2020-4628.json create mode 100644 2020/4xxx/CVE-2020-4629.json create mode 100644 2020/4xxx/CVE-2020-4630.json create mode 100644 2020/4xxx/CVE-2020-4631.json create mode 100644 2020/4xxx/CVE-2020-4632.json create mode 100644 2020/4xxx/CVE-2020-4633.json create mode 100644 2020/4xxx/CVE-2020-4634.json create mode 100644 2020/4xxx/CVE-2020-4635.json create mode 100644 2020/4xxx/CVE-2020-4636.json create mode 100644 2020/4xxx/CVE-2020-4637.json create mode 100644 2020/4xxx/CVE-2020-4638.json create mode 100644 2020/4xxx/CVE-2020-4639.json create mode 100644 2020/4xxx/CVE-2020-4640.json create mode 100644 2020/4xxx/CVE-2020-4641.json create mode 100644 2020/4xxx/CVE-2020-4642.json create mode 100644 2020/4xxx/CVE-2020-4643.json create mode 100644 2020/4xxx/CVE-2020-4644.json create mode 100644 2020/4xxx/CVE-2020-4645.json create mode 100644 2020/4xxx/CVE-2020-4646.json create mode 100644 2020/4xxx/CVE-2020-4647.json create mode 100644 2020/4xxx/CVE-2020-4648.json create mode 100644 2020/4xxx/CVE-2020-4649.json create mode 100644 2020/4xxx/CVE-2020-4884.json create mode 100644 2020/4xxx/CVE-2020-4885.json create mode 100644 2020/4xxx/CVE-2020-4886.json create mode 100644 2020/4xxx/CVE-2020-4887.json create mode 100644 2020/4xxx/CVE-2020-4888.json create mode 100644 2020/4xxx/CVE-2020-4889.json create mode 100644 2020/4xxx/CVE-2020-4890.json create mode 100644 2020/4xxx/CVE-2020-4891.json create mode 100644 2020/4xxx/CVE-2020-4892.json create mode 100644 2020/4xxx/CVE-2020-4893.json create mode 100644 2020/4xxx/CVE-2020-4894.json create mode 100644 2020/4xxx/CVE-2020-4895.json create mode 100644 2020/4xxx/CVE-2020-4896.json create mode 100644 2020/4xxx/CVE-2020-4897.json create mode 100644 2020/4xxx/CVE-2020-4898.json create mode 100644 2020/4xxx/CVE-2020-4899.json create mode 100644 2020/4xxx/CVE-2020-4900.json create mode 100644 2020/4xxx/CVE-2020-4901.json create mode 100644 2020/4xxx/CVE-2020-4902.json create mode 100644 2020/4xxx/CVE-2020-4903.json create mode 100644 2020/4xxx/CVE-2020-4904.json create mode 100644 2020/4xxx/CVE-2020-4905.json diff --git a/2019/10xxx/CVE-2019-10774.json b/2019/10xxx/CVE-2019-10774.json index c6f169e64ef..752f71e4e8c 100644 --- a/2019/10xxx/CVE-2019-10774.json +++ b/2019/10xxx/CVE-2019-10774.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10774", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "report@snyk.io", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "php-shellcommand", + "version": { + "version_data": [ + { + "version_value": "All versions prior to version 1.6.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://snyk.io/vuln/SNYK-PHP-MIKEHAERTLPHPSHELLCOMMAND-538426", + "url": "https://snyk.io/vuln/SNYK-PHP-MIKEHAERTLPHPSHELLCOMMAND-538426" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "php-shellcommand versions before 1.6.1 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution." } ] } diff --git a/2019/17xxx/CVE-2019-17558.json b/2019/17xxx/CVE-2019-17558.json new file mode 100644 index 00000000000..5e9c39beaff --- /dev/null +++ b/2019/17xxx/CVE-2019-17558.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-17558", + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Apache Solr", + "version": { + "version_data": [ + { + "version_value": "Apache Solr 5.0.0 to Apache Solr 8.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://issues.apache.org/jira/browse/SOLR-13971", + "url": "https://issues.apache.org/jira/browse/SOLR-13971" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user)." + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17621.json b/2019/17xxx/CVE-2019-17621.json new file mode 100644 index 00000000000..ba5cdc63ca4 --- /dev/null +++ b/2019/17xxx/CVE-2019-17621.json @@ -0,0 +1,87 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17621", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf", + "refsource": "MISC", + "name": "https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf" + }, + { + "url": "https://www.dlink.com/en/security-bulletin", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin" + }, + { + "refsource": "CONFIRM", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147", + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147" + }, + { + "refsource": "CONFIRM", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10146", + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10146" + }, + { + "refsource": "MISC", + "name": "https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104", + "url": "https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104" + }, + { + "refsource": "MISC", + "name": "https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9", + "url": "https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9" + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20140.json b/2019/20xxx/CVE-2019-20140.json new file mode 100644 index 00000000000..75a919a76bc --- /dev/null +++ b/2019/20xxx/CVE-2019-20140.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-20140", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/saitoha/libsixel/issues/122", + "refsource": "MISC", + "name": "https://github.com/saitoha/libsixel/issues/122" + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20141.json b/2019/20xxx/CVE-2019-20141.json index 6bfb7e73a64..45ee82588e5 100644 --- a/2019/20xxx/CVE-2019-20141.json +++ b/2019/20xxx/CVE-2019-20141.json @@ -1,61 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-20141", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20141", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, "description": { "description_data": [ { "lang": "eng", - "value": "An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://knassar7o2.blogspot.com/2019/12/neon-dashboard-xss-reflected.html", - "refsource": "MISC", - "name": "https://knassar7o2.blogspot.com/2019/12/neon-dashboard-xss-reflected.html" + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } diff --git a/2019/4xxx/CVE-2019-4763.json b/2019/4xxx/CVE-2019-4763.json index b50fb56e8bc..618b94f80ad 100644 --- a/2019/4xxx/CVE-2019-4763.json +++ b/2019/4xxx/CVE-2019-4763.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-4763", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-4763", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/4xxx/CVE-2019-4764.json b/2019/4xxx/CVE-2019-4764.json index c35e95664f8..e9c9269db99 100644 --- a/2019/4xxx/CVE-2019-4764.json +++ b/2019/4xxx/CVE-2019-4764.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-4764", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-4764", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/4xxx/CVE-2019-4765.json b/2019/4xxx/CVE-2019-4765.json index 0f5365c31e2..38bde17b4b1 100644 --- a/2019/4xxx/CVE-2019-4765.json +++ b/2019/4xxx/CVE-2019-4765.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-4765", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-4765", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/4xxx/CVE-2019-4766.json b/2019/4xxx/CVE-2019-4766.json index f4ff88a64b4..565a7f7ab4c 100644 --- a/2019/4xxx/CVE-2019-4766.json +++ b/2019/4xxx/CVE-2019-4766.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-4766", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-4766", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/5xxx/CVE-2019-5001.json b/2019/5xxx/CVE-2019-5001.json index 901caf77f87..eb1abc3629d 100644 --- a/2019/5xxx/CVE-2019-5001.json +++ b/2019/5xxx/CVE-2019-5001.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5001", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5001", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/5xxx/CVE-2019-5002.json b/2019/5xxx/CVE-2019-5002.json index f1b1913a0db..ad025127fe3 100644 --- a/2019/5xxx/CVE-2019-5002.json +++ b/2019/5xxx/CVE-2019-5002.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5002", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5002", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/5xxx/CVE-2019-5003.json b/2019/5xxx/CVE-2019-5003.json index cbb878dfd90..b8b0aed3cba 100644 --- a/2019/5xxx/CVE-2019-5003.json +++ b/2019/5xxx/CVE-2019-5003.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5003", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5003", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2020/4xxx/CVE-2020-4130.json b/2020/4xxx/CVE-2020-4130.json new file mode 100644 index 00000000000..d0692b7fbf0 --- /dev/null +++ b/2020/4xxx/CVE-2020-4130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4131.json b/2020/4xxx/CVE-2020-4131.json new file mode 100644 index 00000000000..8850a51a7e7 --- /dev/null +++ b/2020/4xxx/CVE-2020-4131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4132.json b/2020/4xxx/CVE-2020-4132.json new file mode 100644 index 00000000000..862adbbd49f --- /dev/null +++ b/2020/4xxx/CVE-2020-4132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4133.json b/2020/4xxx/CVE-2020-4133.json new file mode 100644 index 00000000000..87569caacb3 --- /dev/null +++ b/2020/4xxx/CVE-2020-4133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4134.json b/2020/4xxx/CVE-2020-4134.json new file mode 100644 index 00000000000..1a7f4f4e8b5 --- /dev/null +++ b/2020/4xxx/CVE-2020-4134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4135.json b/2020/4xxx/CVE-2020-4135.json new file mode 100644 index 00000000000..4dd93187a0c --- /dev/null +++ b/2020/4xxx/CVE-2020-4135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4136.json b/2020/4xxx/CVE-2020-4136.json new file mode 100644 index 00000000000..e4cb53044a3 --- /dev/null +++ b/2020/4xxx/CVE-2020-4136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4137.json b/2020/4xxx/CVE-2020-4137.json new file mode 100644 index 00000000000..652ea7a795d --- /dev/null +++ b/2020/4xxx/CVE-2020-4137.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4137", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4138.json b/2020/4xxx/CVE-2020-4138.json new file mode 100644 index 00000000000..86c7eca139b --- /dev/null +++ b/2020/4xxx/CVE-2020-4138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4373.json b/2020/4xxx/CVE-2020-4373.json new file mode 100644 index 00000000000..c0a8a0f2238 --- /dev/null +++ b/2020/4xxx/CVE-2020-4373.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4373", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4374.json b/2020/4xxx/CVE-2020-4374.json new file mode 100644 index 00000000000..f05571442f7 --- /dev/null +++ b/2020/4xxx/CVE-2020-4374.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4374", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4375.json b/2020/4xxx/CVE-2020-4375.json new file mode 100644 index 00000000000..9125eb1d5df --- /dev/null +++ b/2020/4xxx/CVE-2020-4375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4376.json b/2020/4xxx/CVE-2020-4376.json new file mode 100644 index 00000000000..805482b38d7 --- /dev/null +++ b/2020/4xxx/CVE-2020-4376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4377.json b/2020/4xxx/CVE-2020-4377.json new file mode 100644 index 00000000000..bd96d5196d8 --- /dev/null +++ b/2020/4xxx/CVE-2020-4377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4378.json b/2020/4xxx/CVE-2020-4378.json new file mode 100644 index 00000000000..a68bec5f159 --- /dev/null +++ b/2020/4xxx/CVE-2020-4378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4379.json b/2020/4xxx/CVE-2020-4379.json new file mode 100644 index 00000000000..53738d67396 --- /dev/null +++ b/2020/4xxx/CVE-2020-4379.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4379", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4380.json b/2020/4xxx/CVE-2020-4380.json new file mode 100644 index 00000000000..b2ac1428707 --- /dev/null +++ b/2020/4xxx/CVE-2020-4380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4381.json b/2020/4xxx/CVE-2020-4381.json new file mode 100644 index 00000000000..196d2262ada --- /dev/null +++ b/2020/4xxx/CVE-2020-4381.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4381", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4382.json b/2020/4xxx/CVE-2020-4382.json new file mode 100644 index 00000000000..b7a6befcfcc --- /dev/null +++ b/2020/4xxx/CVE-2020-4382.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4382", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4383.json b/2020/4xxx/CVE-2020-4383.json new file mode 100644 index 00000000000..dc55e55d894 --- /dev/null +++ b/2020/4xxx/CVE-2020-4383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4384.json b/2020/4xxx/CVE-2020-4384.json new file mode 100644 index 00000000000..0916fb21b2b --- /dev/null +++ b/2020/4xxx/CVE-2020-4384.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4384", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4385.json b/2020/4xxx/CVE-2020-4385.json new file mode 100644 index 00000000000..8b36435e12c --- /dev/null +++ b/2020/4xxx/CVE-2020-4385.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4385", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4386.json b/2020/4xxx/CVE-2020-4386.json new file mode 100644 index 00000000000..292a283dce0 --- /dev/null +++ b/2020/4xxx/CVE-2020-4386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4387.json b/2020/4xxx/CVE-2020-4387.json new file mode 100644 index 00000000000..96d797107a7 --- /dev/null +++ b/2020/4xxx/CVE-2020-4387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4388.json b/2020/4xxx/CVE-2020-4388.json new file mode 100644 index 00000000000..adf61afbcf6 --- /dev/null +++ b/2020/4xxx/CVE-2020-4388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4389.json b/2020/4xxx/CVE-2020-4389.json new file mode 100644 index 00000000000..feb7b128d58 --- /dev/null +++ b/2020/4xxx/CVE-2020-4389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4390.json b/2020/4xxx/CVE-2020-4390.json new file mode 100644 index 00000000000..9856f6c243e --- /dev/null +++ b/2020/4xxx/CVE-2020-4390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4391.json b/2020/4xxx/CVE-2020-4391.json new file mode 100644 index 00000000000..7a61285eff6 --- /dev/null +++ b/2020/4xxx/CVE-2020-4391.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4391", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4392.json b/2020/4xxx/CVE-2020-4392.json new file mode 100644 index 00000000000..267cc070210 --- /dev/null +++ b/2020/4xxx/CVE-2020-4392.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4392", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4393.json b/2020/4xxx/CVE-2020-4393.json new file mode 100644 index 00000000000..8b27329685d --- /dev/null +++ b/2020/4xxx/CVE-2020-4393.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4393", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4628.json b/2020/4xxx/CVE-2020-4628.json new file mode 100644 index 00000000000..1e972d01ccd --- /dev/null +++ b/2020/4xxx/CVE-2020-4628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4628", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4629.json b/2020/4xxx/CVE-2020-4629.json new file mode 100644 index 00000000000..c6707141bdd --- /dev/null +++ b/2020/4xxx/CVE-2020-4629.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4629", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4630.json b/2020/4xxx/CVE-2020-4630.json new file mode 100644 index 00000000000..dbffa0402c6 --- /dev/null +++ b/2020/4xxx/CVE-2020-4630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4631.json b/2020/4xxx/CVE-2020-4631.json new file mode 100644 index 00000000000..f9c088b66d6 --- /dev/null +++ b/2020/4xxx/CVE-2020-4631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4632.json b/2020/4xxx/CVE-2020-4632.json new file mode 100644 index 00000000000..89273af81f7 --- /dev/null +++ b/2020/4xxx/CVE-2020-4632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4633.json b/2020/4xxx/CVE-2020-4633.json new file mode 100644 index 00000000000..9ab08563c0c --- /dev/null +++ b/2020/4xxx/CVE-2020-4633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4634.json b/2020/4xxx/CVE-2020-4634.json new file mode 100644 index 00000000000..6b497f1526d --- /dev/null +++ b/2020/4xxx/CVE-2020-4634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4635.json b/2020/4xxx/CVE-2020-4635.json new file mode 100644 index 00000000000..e5d3a689c2c --- /dev/null +++ b/2020/4xxx/CVE-2020-4635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4636.json b/2020/4xxx/CVE-2020-4636.json new file mode 100644 index 00000000000..11a41c001bd --- /dev/null +++ b/2020/4xxx/CVE-2020-4636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4637.json b/2020/4xxx/CVE-2020-4637.json new file mode 100644 index 00000000000..e4ea3e3ecf1 --- /dev/null +++ b/2020/4xxx/CVE-2020-4637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4638.json b/2020/4xxx/CVE-2020-4638.json new file mode 100644 index 00000000000..6983ba8e66c --- /dev/null +++ b/2020/4xxx/CVE-2020-4638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4639.json b/2020/4xxx/CVE-2020-4639.json new file mode 100644 index 00000000000..fe559111a89 --- /dev/null +++ b/2020/4xxx/CVE-2020-4639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4640.json b/2020/4xxx/CVE-2020-4640.json new file mode 100644 index 00000000000..bdc0601b58c --- /dev/null +++ b/2020/4xxx/CVE-2020-4640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4641.json b/2020/4xxx/CVE-2020-4641.json new file mode 100644 index 00000000000..a3e01fe8a05 --- /dev/null +++ b/2020/4xxx/CVE-2020-4641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4642.json b/2020/4xxx/CVE-2020-4642.json new file mode 100644 index 00000000000..758f4f8fd34 --- /dev/null +++ b/2020/4xxx/CVE-2020-4642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4643.json b/2020/4xxx/CVE-2020-4643.json new file mode 100644 index 00000000000..791a8d10280 --- /dev/null +++ b/2020/4xxx/CVE-2020-4643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4644.json b/2020/4xxx/CVE-2020-4644.json new file mode 100644 index 00000000000..fdb1741e5bb --- /dev/null +++ b/2020/4xxx/CVE-2020-4644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4645.json b/2020/4xxx/CVE-2020-4645.json new file mode 100644 index 00000000000..f790c6bd870 --- /dev/null +++ b/2020/4xxx/CVE-2020-4645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4646.json b/2020/4xxx/CVE-2020-4646.json new file mode 100644 index 00000000000..80d2e196bb9 --- /dev/null +++ b/2020/4xxx/CVE-2020-4646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4647.json b/2020/4xxx/CVE-2020-4647.json new file mode 100644 index 00000000000..6cabdcf65da --- /dev/null +++ b/2020/4xxx/CVE-2020-4647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4648.json b/2020/4xxx/CVE-2020-4648.json new file mode 100644 index 00000000000..a4dbb251fc7 --- /dev/null +++ b/2020/4xxx/CVE-2020-4648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4649.json b/2020/4xxx/CVE-2020-4649.json new file mode 100644 index 00000000000..ff9a1f709bf --- /dev/null +++ b/2020/4xxx/CVE-2020-4649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4884.json b/2020/4xxx/CVE-2020-4884.json new file mode 100644 index 00000000000..e9c75714889 --- /dev/null +++ b/2020/4xxx/CVE-2020-4884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4885.json b/2020/4xxx/CVE-2020-4885.json new file mode 100644 index 00000000000..71374809c9a --- /dev/null +++ b/2020/4xxx/CVE-2020-4885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4886.json b/2020/4xxx/CVE-2020-4886.json new file mode 100644 index 00000000000..9db536b634c --- /dev/null +++ b/2020/4xxx/CVE-2020-4886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4887.json b/2020/4xxx/CVE-2020-4887.json new file mode 100644 index 00000000000..109a5291534 --- /dev/null +++ b/2020/4xxx/CVE-2020-4887.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4887", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4888.json b/2020/4xxx/CVE-2020-4888.json new file mode 100644 index 00000000000..5c5ce7f0bd0 --- /dev/null +++ b/2020/4xxx/CVE-2020-4888.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4889.json b/2020/4xxx/CVE-2020-4889.json new file mode 100644 index 00000000000..69bd764347a --- /dev/null +++ b/2020/4xxx/CVE-2020-4889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4890.json b/2020/4xxx/CVE-2020-4890.json new file mode 100644 index 00000000000..13cda19fc5d --- /dev/null +++ b/2020/4xxx/CVE-2020-4890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4891.json b/2020/4xxx/CVE-2020-4891.json new file mode 100644 index 00000000000..77cdef0b53a --- /dev/null +++ b/2020/4xxx/CVE-2020-4891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4892.json b/2020/4xxx/CVE-2020-4892.json new file mode 100644 index 00000000000..5e1b6b3d28b --- /dev/null +++ b/2020/4xxx/CVE-2020-4892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4893.json b/2020/4xxx/CVE-2020-4893.json new file mode 100644 index 00000000000..469acd2217a --- /dev/null +++ b/2020/4xxx/CVE-2020-4893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4894.json b/2020/4xxx/CVE-2020-4894.json new file mode 100644 index 00000000000..133bfd57590 --- /dev/null +++ b/2020/4xxx/CVE-2020-4894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4895.json b/2020/4xxx/CVE-2020-4895.json new file mode 100644 index 00000000000..6d6486da694 --- /dev/null +++ b/2020/4xxx/CVE-2020-4895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4896.json b/2020/4xxx/CVE-2020-4896.json new file mode 100644 index 00000000000..f8e180b7481 --- /dev/null +++ b/2020/4xxx/CVE-2020-4896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4897.json b/2020/4xxx/CVE-2020-4897.json new file mode 100644 index 00000000000..a464b317a48 --- /dev/null +++ b/2020/4xxx/CVE-2020-4897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4898.json b/2020/4xxx/CVE-2020-4898.json new file mode 100644 index 00000000000..6de04134d1e --- /dev/null +++ b/2020/4xxx/CVE-2020-4898.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4898", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4899.json b/2020/4xxx/CVE-2020-4899.json new file mode 100644 index 00000000000..9fa612253eb --- /dev/null +++ b/2020/4xxx/CVE-2020-4899.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4899", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4900.json b/2020/4xxx/CVE-2020-4900.json new file mode 100644 index 00000000000..e3b9ff1381d --- /dev/null +++ b/2020/4xxx/CVE-2020-4900.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4900", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4901.json b/2020/4xxx/CVE-2020-4901.json new file mode 100644 index 00000000000..dd24694d0e3 --- /dev/null +++ b/2020/4xxx/CVE-2020-4901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4902.json b/2020/4xxx/CVE-2020-4902.json new file mode 100644 index 00000000000..38094d33dd6 --- /dev/null +++ b/2020/4xxx/CVE-2020-4902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4903.json b/2020/4xxx/CVE-2020-4903.json new file mode 100644 index 00000000000..feb1ba46dc9 --- /dev/null +++ b/2020/4xxx/CVE-2020-4903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4904.json b/2020/4xxx/CVE-2020-4904.json new file mode 100644 index 00000000000..921f08cac2f --- /dev/null +++ b/2020/4xxx/CVE-2020-4904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4905.json b/2020/4xxx/CVE-2020-4905.json new file mode 100644 index 00000000000..c8f3a7a62b6 --- /dev/null +++ b/2020/4xxx/CVE-2020-4905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-4905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file