diff --git a/2020/12xxx/CVE-2020-12284.json b/2020/12xxx/CVE-2020-12284.json new file mode 100644 index 00000000000..2fa0ae45411 --- /dev/null +++ b/2020/12xxx/CVE-2020-12284.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-12284", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cbs_jpeg_split_fragment in libavcodec/cbs_jpeg.c in FFmpeg 4.2.2 has a heap-based buffer overflow during JPEG_MARKER_SOS handling because of a missing length check." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e2e260a4db2726", + "refsource": "MISC", + "name": "https://github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e2e260a4db2726" + }, + { + "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19734", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19734" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12285.json b/2020/12xxx/CVE-2020-12285.json new file mode 100644 index 00000000000..78fc0cc6922 --- /dev/null +++ b/2020/12xxx/CVE-2020-12285.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12285", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5570.json b/2020/5xxx/CVE-2020-5570.json index 9dde3e3ae43..67abd8fc476 100644 --- a/2020/5xxx/CVE-2020-5570.json +++ b/2020/5xxx/CVE-2020-5570.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5570", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "http://ni-consul.jp/support/info/2020/20200424_ge.html" + "url": "http://ni-consul.jp/support/info/2020/20200424_ge.html", + "refsource": "MISC", + "name": "http://ni-consul.jp/support/info/2020/20200424_ge.html" }, { - "url": "https://jvn.jp/en/jp/JVN47668991/index.html" + "url": "https://jvn.jp/en/jp/JVN47668991/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN47668991/index.html" } ] },