From 9a5870685678a47bb1f3e26f36763d2f7b2155e3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 19 Oct 2020 17:01:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/1010xxx/CVE-2019-1010023.json | 2 +- 2020/26xxx/CVE-2020-26891.json | 66 +++++++++++++++++++++++++++--- 2020/27xxx/CVE-2020-27251.json | 18 ++++++++ 2020/27xxx/CVE-2020-27252.json | 18 ++++++++ 2020/27xxx/CVE-2020-27253.json | 18 ++++++++ 2020/27xxx/CVE-2020-27254.json | 18 ++++++++ 2020/27xxx/CVE-2020-27255.json | 18 ++++++++ 2020/27xxx/CVE-2020-27256.json | 18 ++++++++ 2020/27xxx/CVE-2020-27257.json | 18 ++++++++ 2020/27xxx/CVE-2020-27258.json | 18 ++++++++ 2020/27xxx/CVE-2020-27259.json | 18 ++++++++ 2020/27xxx/CVE-2020-27260.json | 18 ++++++++ 2020/27xxx/CVE-2020-27261.json | 18 ++++++++ 2020/27xxx/CVE-2020-27262.json | 18 ++++++++ 2020/27xxx/CVE-2020-27263.json | 18 ++++++++ 2020/27xxx/CVE-2020-27264.json | 18 ++++++++ 2020/27xxx/CVE-2020-27265.json | 18 ++++++++ 2020/27xxx/CVE-2020-27266.json | 18 ++++++++ 2020/27xxx/CVE-2020-27267.json | 18 ++++++++ 2020/27xxx/CVE-2020-27268.json | 18 ++++++++ 2020/27xxx/CVE-2020-27269.json | 18 ++++++++ 2020/27xxx/CVE-2020-27270.json | 18 ++++++++ 2020/27xxx/CVE-2020-27271.json | 18 ++++++++ 2020/27xxx/CVE-2020-27272.json | 18 ++++++++ 2020/27xxx/CVE-2020-27273.json | 18 ++++++++ 2020/27xxx/CVE-2020-27274.json | 18 ++++++++ 2020/27xxx/CVE-2020-27275.json | 18 ++++++++ 2020/27xxx/CVE-2020-27276.json | 18 ++++++++ 2020/27xxx/CVE-2020-27277.json | 18 ++++++++ 2020/27xxx/CVE-2020-27278.json | 18 ++++++++ 2020/27xxx/CVE-2020-27279.json | 18 ++++++++ 2020/27xxx/CVE-2020-27280.json | 18 ++++++++ 2020/27xxx/CVE-2020-27281.json | 18 ++++++++ 2020/27xxx/CVE-2020-27282.json | 18 ++++++++ 2020/27xxx/CVE-2020-27283.json | 18 ++++++++ 2020/27xxx/CVE-2020-27284.json | 18 ++++++++ 2020/27xxx/CVE-2020-27285.json | 18 ++++++++ 2020/27xxx/CVE-2020-27286.json | 18 ++++++++ 2020/27xxx/CVE-2020-27287.json | 18 ++++++++ 2020/27xxx/CVE-2020-27288.json | 18 ++++++++ 2020/27xxx/CVE-2020-27289.json | 18 ++++++++ 2020/27xxx/CVE-2020-27290.json | 18 ++++++++ 2020/27xxx/CVE-2020-27291.json | 18 ++++++++ 2020/27xxx/CVE-2020-27292.json | 18 ++++++++ 2020/27xxx/CVE-2020-27293.json | 18 ++++++++ 2020/27xxx/CVE-2020-27294.json | 18 ++++++++ 2020/27xxx/CVE-2020-27295.json | 18 ++++++++ 2020/27xxx/CVE-2020-27296.json | 18 ++++++++ 2020/27xxx/CVE-2020-27297.json | 18 ++++++++ 2020/27xxx/CVE-2020-27298.json | 18 ++++++++ 2020/27xxx/CVE-2020-27299.json | 18 ++++++++ 2020/27xxx/CVE-2020-27300.json | 18 ++++++++ 52 files changed, 961 insertions(+), 7 deletions(-) create mode 100644 2020/27xxx/CVE-2020-27251.json create mode 100644 2020/27xxx/CVE-2020-27252.json create mode 100644 2020/27xxx/CVE-2020-27253.json create mode 100644 2020/27xxx/CVE-2020-27254.json create mode 100644 2020/27xxx/CVE-2020-27255.json create mode 100644 2020/27xxx/CVE-2020-27256.json create mode 100644 2020/27xxx/CVE-2020-27257.json create mode 100644 2020/27xxx/CVE-2020-27258.json create mode 100644 2020/27xxx/CVE-2020-27259.json create mode 100644 2020/27xxx/CVE-2020-27260.json create mode 100644 2020/27xxx/CVE-2020-27261.json create mode 100644 2020/27xxx/CVE-2020-27262.json create mode 100644 2020/27xxx/CVE-2020-27263.json create mode 100644 2020/27xxx/CVE-2020-27264.json create mode 100644 2020/27xxx/CVE-2020-27265.json create mode 100644 2020/27xxx/CVE-2020-27266.json create mode 100644 2020/27xxx/CVE-2020-27267.json create mode 100644 2020/27xxx/CVE-2020-27268.json create mode 100644 2020/27xxx/CVE-2020-27269.json create mode 100644 2020/27xxx/CVE-2020-27270.json create mode 100644 2020/27xxx/CVE-2020-27271.json create mode 100644 2020/27xxx/CVE-2020-27272.json create mode 100644 2020/27xxx/CVE-2020-27273.json create mode 100644 2020/27xxx/CVE-2020-27274.json create mode 100644 2020/27xxx/CVE-2020-27275.json create mode 100644 2020/27xxx/CVE-2020-27276.json create mode 100644 2020/27xxx/CVE-2020-27277.json create mode 100644 2020/27xxx/CVE-2020-27278.json create mode 100644 2020/27xxx/CVE-2020-27279.json create mode 100644 2020/27xxx/CVE-2020-27280.json create mode 100644 2020/27xxx/CVE-2020-27281.json create mode 100644 2020/27xxx/CVE-2020-27282.json create mode 100644 2020/27xxx/CVE-2020-27283.json create mode 100644 2020/27xxx/CVE-2020-27284.json create mode 100644 2020/27xxx/CVE-2020-27285.json create mode 100644 2020/27xxx/CVE-2020-27286.json create mode 100644 2020/27xxx/CVE-2020-27287.json create mode 100644 2020/27xxx/CVE-2020-27288.json create mode 100644 2020/27xxx/CVE-2020-27289.json create mode 100644 2020/27xxx/CVE-2020-27290.json create mode 100644 2020/27xxx/CVE-2020-27291.json create mode 100644 2020/27xxx/CVE-2020-27292.json create mode 100644 2020/27xxx/CVE-2020-27293.json create mode 100644 2020/27xxx/CVE-2020-27294.json create mode 100644 2020/27xxx/CVE-2020-27295.json create mode 100644 2020/27xxx/CVE-2020-27296.json create mode 100644 2020/27xxx/CVE-2020-27297.json create mode 100644 2020/27xxx/CVE-2020-27298.json create mode 100644 2020/27xxx/CVE-2020-27299.json create mode 100644 2020/27xxx/CVE-2020-27300.json diff --git a/2019/1010xxx/CVE-2019-1010023.json b/2019/1010xxx/CVE-2019-1010023.json index f2723097351..c5663554a4b 100644 --- a/2019/1010xxx/CVE-2019-1010023.json +++ b/2019/1010xxx/CVE-2019-1010023.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "GNU Libc current is affected by: Re-mapping current loaded libray with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code." + "value": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code." } ] }, diff --git a/2020/26xxx/CVE-2020-26891.json b/2020/26xxx/CVE-2020-26891.json index 4c107cd2cbb..49f11daee7f 100644 --- a/2020/26xxx/CVE-2020-26891.json +++ b/2020/26xxx/CVE-2020-26891.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-26891", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-26891", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "AuthRestServlet in Matrix Synapse before 1.21.0 is vulnerable to XSS due to unsafe interpolation of the session GET parameter. This allows a remote attacker to execute an XSS attack on the domain Synapse is hosted on, by supplying the victim user with a malicious URL to the /_matrix/client/r0/auth/m.login.recaptcha or /_matrix/client/r0/auth/m.login.terms Synapse 974923." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/matrix-org/synapse/releases", + "refsource": "MISC", + "name": "https://github.com/matrix-org/synapse/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/matrix-org/synapse/pull/8444", + "url": "https://github.com/matrix-org/synapse/pull/8444" + }, + { + "refsource": "MISC", + "name": "https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory", + "url": "https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory" } ] } diff --git a/2020/27xxx/CVE-2020-27251.json b/2020/27xxx/CVE-2020-27251.json new file mode 100644 index 00000000000..35f0c94644b --- /dev/null +++ b/2020/27xxx/CVE-2020-27251.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27251", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27252.json b/2020/27xxx/CVE-2020-27252.json new file mode 100644 index 00000000000..0db0bc4e3e0 --- /dev/null +++ b/2020/27xxx/CVE-2020-27252.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27252", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27253.json b/2020/27xxx/CVE-2020-27253.json new file mode 100644 index 00000000000..02b41b7901b --- /dev/null +++ b/2020/27xxx/CVE-2020-27253.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27253", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27254.json b/2020/27xxx/CVE-2020-27254.json new file mode 100644 index 00000000000..ffe62ead21d --- /dev/null +++ b/2020/27xxx/CVE-2020-27254.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27254", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27255.json b/2020/27xxx/CVE-2020-27255.json new file mode 100644 index 00000000000..1742f340edf --- /dev/null +++ b/2020/27xxx/CVE-2020-27255.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27255", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27256.json b/2020/27xxx/CVE-2020-27256.json new file mode 100644 index 00000000000..71e1832cb65 --- /dev/null +++ b/2020/27xxx/CVE-2020-27256.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27256", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27257.json b/2020/27xxx/CVE-2020-27257.json new file mode 100644 index 00000000000..60099a31679 --- /dev/null +++ b/2020/27xxx/CVE-2020-27257.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27257", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27258.json b/2020/27xxx/CVE-2020-27258.json new file mode 100644 index 00000000000..67acbeb8161 --- /dev/null +++ b/2020/27xxx/CVE-2020-27258.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27258", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27259.json b/2020/27xxx/CVE-2020-27259.json new file mode 100644 index 00000000000..23924f6265a --- /dev/null +++ b/2020/27xxx/CVE-2020-27259.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27259", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27260.json b/2020/27xxx/CVE-2020-27260.json new file mode 100644 index 00000000000..1fcba09a33e --- /dev/null +++ b/2020/27xxx/CVE-2020-27260.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27260", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27261.json b/2020/27xxx/CVE-2020-27261.json new file mode 100644 index 00000000000..e337613c4c5 --- /dev/null +++ b/2020/27xxx/CVE-2020-27261.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27261", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27262.json b/2020/27xxx/CVE-2020-27262.json new file mode 100644 index 00000000000..5c6646079a4 --- /dev/null +++ b/2020/27xxx/CVE-2020-27262.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27262", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27263.json b/2020/27xxx/CVE-2020-27263.json new file mode 100644 index 00000000000..ccf37f09065 --- /dev/null +++ b/2020/27xxx/CVE-2020-27263.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27263", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27264.json b/2020/27xxx/CVE-2020-27264.json new file mode 100644 index 00000000000..3150681fd0d --- /dev/null +++ b/2020/27xxx/CVE-2020-27264.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27264", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27265.json b/2020/27xxx/CVE-2020-27265.json new file mode 100644 index 00000000000..cbf5e5f0c67 --- /dev/null +++ b/2020/27xxx/CVE-2020-27265.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27265", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27266.json b/2020/27xxx/CVE-2020-27266.json new file mode 100644 index 00000000000..d1328cfa419 --- /dev/null +++ b/2020/27xxx/CVE-2020-27266.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27266", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27267.json b/2020/27xxx/CVE-2020-27267.json new file mode 100644 index 00000000000..d908083162e --- /dev/null +++ b/2020/27xxx/CVE-2020-27267.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27267", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27268.json b/2020/27xxx/CVE-2020-27268.json new file mode 100644 index 00000000000..f8a922483dc --- /dev/null +++ b/2020/27xxx/CVE-2020-27268.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27268", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27269.json b/2020/27xxx/CVE-2020-27269.json new file mode 100644 index 00000000000..7f5e4302684 --- /dev/null +++ b/2020/27xxx/CVE-2020-27269.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27269", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27270.json b/2020/27xxx/CVE-2020-27270.json new file mode 100644 index 00000000000..ad184a82a95 --- /dev/null +++ b/2020/27xxx/CVE-2020-27270.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27270", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27271.json b/2020/27xxx/CVE-2020-27271.json new file mode 100644 index 00000000000..7dbdd151d5d --- /dev/null +++ b/2020/27xxx/CVE-2020-27271.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27272.json b/2020/27xxx/CVE-2020-27272.json new file mode 100644 index 00000000000..e29d05f25b7 --- /dev/null +++ b/2020/27xxx/CVE-2020-27272.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27272", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27273.json b/2020/27xxx/CVE-2020-27273.json new file mode 100644 index 00000000000..1974dd87a4a --- /dev/null +++ b/2020/27xxx/CVE-2020-27273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27274.json b/2020/27xxx/CVE-2020-27274.json new file mode 100644 index 00000000000..6f2a4079b9d --- /dev/null +++ b/2020/27xxx/CVE-2020-27274.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27274", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27275.json b/2020/27xxx/CVE-2020-27275.json new file mode 100644 index 00000000000..47dc4e39666 --- /dev/null +++ b/2020/27xxx/CVE-2020-27275.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27275", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27276.json b/2020/27xxx/CVE-2020-27276.json new file mode 100644 index 00000000000..6f2b5cdf5dd --- /dev/null +++ b/2020/27xxx/CVE-2020-27276.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27276", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27277.json b/2020/27xxx/CVE-2020-27277.json new file mode 100644 index 00000000000..793b1ff97f2 --- /dev/null +++ b/2020/27xxx/CVE-2020-27277.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27277", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27278.json b/2020/27xxx/CVE-2020-27278.json new file mode 100644 index 00000000000..920dcf5e4ed --- /dev/null +++ b/2020/27xxx/CVE-2020-27278.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27278", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27279.json b/2020/27xxx/CVE-2020-27279.json new file mode 100644 index 00000000000..1bd2f1bae0a --- /dev/null +++ b/2020/27xxx/CVE-2020-27279.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27279", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27280.json b/2020/27xxx/CVE-2020-27280.json new file mode 100644 index 00000000000..00a409c0bac --- /dev/null +++ b/2020/27xxx/CVE-2020-27280.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27280", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27281.json b/2020/27xxx/CVE-2020-27281.json new file mode 100644 index 00000000000..315bda176f5 --- /dev/null +++ b/2020/27xxx/CVE-2020-27281.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27281", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27282.json b/2020/27xxx/CVE-2020-27282.json new file mode 100644 index 00000000000..109a2d8254c --- /dev/null +++ b/2020/27xxx/CVE-2020-27282.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27282", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27283.json b/2020/27xxx/CVE-2020-27283.json new file mode 100644 index 00000000000..ec8a8758d7b --- /dev/null +++ b/2020/27xxx/CVE-2020-27283.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27283", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27284.json b/2020/27xxx/CVE-2020-27284.json new file mode 100644 index 00000000000..10a85d650ac --- /dev/null +++ b/2020/27xxx/CVE-2020-27284.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27284", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27285.json b/2020/27xxx/CVE-2020-27285.json new file mode 100644 index 00000000000..40defe311e8 --- /dev/null +++ b/2020/27xxx/CVE-2020-27285.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27285", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27286.json b/2020/27xxx/CVE-2020-27286.json new file mode 100644 index 00000000000..a814e4ed410 --- /dev/null +++ b/2020/27xxx/CVE-2020-27286.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27286", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27287.json b/2020/27xxx/CVE-2020-27287.json new file mode 100644 index 00000000000..3a00ae0d490 --- /dev/null +++ b/2020/27xxx/CVE-2020-27287.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27287", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27288.json b/2020/27xxx/CVE-2020-27288.json new file mode 100644 index 00000000000..16cf7b53caf --- /dev/null +++ b/2020/27xxx/CVE-2020-27288.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27288", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27289.json b/2020/27xxx/CVE-2020-27289.json new file mode 100644 index 00000000000..385ae6d20e7 --- /dev/null +++ b/2020/27xxx/CVE-2020-27289.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27289", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27290.json b/2020/27xxx/CVE-2020-27290.json new file mode 100644 index 00000000000..cff3c6b01be --- /dev/null +++ b/2020/27xxx/CVE-2020-27290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27291.json b/2020/27xxx/CVE-2020-27291.json new file mode 100644 index 00000000000..da50b661bb8 --- /dev/null +++ b/2020/27xxx/CVE-2020-27291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27292.json b/2020/27xxx/CVE-2020-27292.json new file mode 100644 index 00000000000..9d52b216373 --- /dev/null +++ b/2020/27xxx/CVE-2020-27292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27293.json b/2020/27xxx/CVE-2020-27293.json new file mode 100644 index 00000000000..fa12475f223 --- /dev/null +++ b/2020/27xxx/CVE-2020-27293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27294.json b/2020/27xxx/CVE-2020-27294.json new file mode 100644 index 00000000000..7523266aee3 --- /dev/null +++ b/2020/27xxx/CVE-2020-27294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27295.json b/2020/27xxx/CVE-2020-27295.json new file mode 100644 index 00000000000..b53b4dffd21 --- /dev/null +++ b/2020/27xxx/CVE-2020-27295.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27295", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27296.json b/2020/27xxx/CVE-2020-27296.json new file mode 100644 index 00000000000..254e989e3d4 --- /dev/null +++ b/2020/27xxx/CVE-2020-27296.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27296", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27297.json b/2020/27xxx/CVE-2020-27297.json new file mode 100644 index 00000000000..d9ad6cf6a63 --- /dev/null +++ b/2020/27xxx/CVE-2020-27297.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27297", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27298.json b/2020/27xxx/CVE-2020-27298.json new file mode 100644 index 00000000000..6fa026cab83 --- /dev/null +++ b/2020/27xxx/CVE-2020-27298.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27298", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27299.json b/2020/27xxx/CVE-2020-27299.json new file mode 100644 index 00000000000..beb6982a03e --- /dev/null +++ b/2020/27xxx/CVE-2020-27299.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27299", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27300.json b/2020/27xxx/CVE-2020-27300.json new file mode 100644 index 00000000000..c005466cda5 --- /dev/null +++ b/2020/27xxx/CVE-2020-27300.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27300", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file