From a9d6712e156a27aa8f01edebcf6ce271e3f2b331 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 18 Dec 2020 19:01:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/20xxx/CVE-2020-20276.json | 61 ++++++++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20277.json | 61 ++++++++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20285.json | 56 +++++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20298.json | 56 +++++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20299.json | 56 +++++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20300.json | 56 +++++++++++++++++++++++++++---- 2020/26xxx/CVE-2020-26280.json | 2 +- 2020/26xxx/CVE-2020-26867.json | 5 +++ 2020/26xxx/CVE-2020-26868.json | 5 +++ 2020/26xxx/CVE-2020-26869.json | 5 +++ 2020/27xxx/CVE-2020-27216.json | 15 +++++++++ 2020/27xxx/CVE-2020-27687.json | 61 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35556.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35557.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35558.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35559.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35560.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35561.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35562.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35563.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35564.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35565.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35566.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35567.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35568.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35569.json | 18 ++++++++++ 2020/35xxx/CVE-2020-35570.json | 18 ++++++++++ 27 files changed, 666 insertions(+), 43 deletions(-) create mode 100644 2020/35xxx/CVE-2020-35556.json create mode 100644 2020/35xxx/CVE-2020-35557.json create mode 100644 2020/35xxx/CVE-2020-35558.json create mode 100644 2020/35xxx/CVE-2020-35559.json create mode 100644 2020/35xxx/CVE-2020-35560.json create mode 100644 2020/35xxx/CVE-2020-35561.json create mode 100644 2020/35xxx/CVE-2020-35562.json create mode 100644 2020/35xxx/CVE-2020-35563.json create mode 100644 2020/35xxx/CVE-2020-35564.json create mode 100644 2020/35xxx/CVE-2020-35565.json create mode 100644 2020/35xxx/CVE-2020-35566.json create mode 100644 2020/35xxx/CVE-2020-35567.json create mode 100644 2020/35xxx/CVE-2020-35568.json create mode 100644 2020/35xxx/CVE-2020-35569.json create mode 100644 2020/35xxx/CVE-2020-35570.json diff --git a/2020/20xxx/CVE-2020-20276.json b/2020/20xxx/CVE-2020-20276.json index 4acc9e13182..21ed40a57ba 100644 --- a/2020/20xxx/CVE-2020-20276.json +++ b/2020/20xxx/CVE-2020-20276.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20276", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20276", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An unauthenticated stack-based buffer overflow vulnerability in common.c's handle_PORT in uftpd FTP server versions 2.10 and earlier can be abused to cause a crash and could potentially lead to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/troglobit/uftpd/commit/0fb2c031ce0ace07cc19cd2cb2143c4b5a63c9dd", + "refsource": "MISC", + "name": "https://github.com/troglobit/uftpd/commit/0fb2c031ce0ace07cc19cd2cb2143c4b5a63c9dd" + }, + { + "url": "https://arinerron.com/blog/posts/6", + "refsource": "MISC", + "name": "https://arinerron.com/blog/posts/6" } ] } diff --git a/2020/20xxx/CVE-2020-20277.json b/2020/20xxx/CVE-2020-20277.json index 334d468b398..854bd8e04d8 100644 --- a/2020/20xxx/CVE-2020-20277.json +++ b/2020/20xxx/CVE-2020-20277.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20277", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20277", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There are multiple unauthenticated directory traversal vulnerabilities in different FTP commands in uftpd FTP server versions 2.7 to 2.10 due to improper implementation of a chroot jail in common.c's compose_abspath function that can be abused to read or write to arbitrary files on the filesystem, leak process memory, or potentially lead to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe", + "refsource": "MISC", + "name": "https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe" + }, + { + "url": "https://arinerron.com/blog/posts/6", + "refsource": "MISC", + "name": "https://arinerron.com/blog/posts/6" } ] } diff --git a/2020/20xxx/CVE-2020-20285.json b/2020/20xxx/CVE-2020-20285.json index dadb8cc2699..813694d207e 100644 --- a/2020/20xxx/CVE-2020-20285.json +++ b/2020/20xxx/CVE-2020-20285.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20285", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20285", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a XSS in the user login page in zzcms 2019. Users can inject js code by the referer header via user/login.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md", + "refsource": "MISC", + "name": "https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md" } ] } diff --git a/2020/20xxx/CVE-2020-20298.json b/2020/20xxx/CVE-2020-20298.json index 3eb61862d6e..3359b5400e4 100644 --- a/2020/20xxx/CVE-2020-20298.json +++ b/2020/20xxx/CVE-2020-20298.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20298", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20298", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Eval injection vulnerability in the parserCommom method in the ParserTemplate class in zzz_template.php in zzzphp 1.7.2 allows remote attackers to execute arbitrary commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://y4er.com/post/zzzphp-rce/", + "refsource": "MISC", + "name": "https://y4er.com/post/zzzphp-rce/" } ] } diff --git a/2020/20xxx/CVE-2020-20299.json b/2020/20xxx/CVE-2020-20299.json index d8e5ba7f9fd..8456521fa13 100644 --- a/2020/20xxx/CVE-2020-20299.json +++ b/2020/20xxx/CVE-2020-20299.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20299", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20299", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WeiPHP 5.0 does not properly restrict access to pages, related to using POST." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Y4er/Y4er.com/blob/master/content/post/weiphp5-unauthorized.md", + "refsource": "MISC", + "name": "https://github.com/Y4er/Y4er.com/blob/master/content/post/weiphp5-unauthorized.md" } ] } diff --git a/2020/20xxx/CVE-2020-20300.json b/2020/20xxx/CVE-2020-20300.json index e62c0faa50c..b4cf224a446 100644 --- a/2020/20xxx/CVE-2020-20300.json +++ b/2020/20xxx/CVE-2020-20300.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20300", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20300", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection vulnerability in the wp_where function in WeiPHP 5.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Y4er/Y4er.com/blob/master/content/post/weiphp-exp-sql.md", + "refsource": "MISC", + "name": "https://github.com/Y4er/Y4er.com/blob/master/content/post/weiphp-exp-sql.md" } ] } diff --git a/2020/26xxx/CVE-2020-26280.json b/2020/26xxx/CVE-2020-26280.json index 5d115519906..a654ea2de37 100644 --- a/2020/26xxx/CVE-2020-26280.json +++ b/2020/26xxx/CVE-2020-26280.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "OpenSlides is a free, Web-based presentation and assembly system for managing and projecting agenda, motions, and elections of assemblies.\nOpenSlides version 3.2, due to unsufficient user input validation and escaping, it is vulnerable\nto persistant cross-site scripting (XSS).\n \nIn the web applications users can enter rich text in various places, e.g.\nfor personal notes or in motions. These fields can be used to store arbitrary\nJavaScript Code that will be executed when other users read the respective\ntext.\nAn attacker could utilize this vulnerability be used to manipulate votes\nof other users, hijack the moderators session or simply disturb the\nmeeting.\n\nThe vulnerability was introduced with 6eae497abeab234418dfbd9d299e831eff86ed45 on 16.04.2020, which is first included in the 3.2 release.\nIt has been patched in version 3.3 ( in commit f3809fc8a97ee305d721662a75f788f9e9d21938, merged in master on 20.11.2020)." + "value": "OpenSlides is a free, Web-based presentation and assembly system for managing and projecting agenda, motions, and elections of assemblies. OpenSlides version 3.2, due to unsufficient user input validation and escaping, it is vulnerable to persistant cross-site scripting (XSS). In the web applications users can enter rich text in various places, e.g. for personal notes or in motions. These fields can be used to store arbitrary JavaScript Code that will be executed when other users read the respective text. An attacker could utilize this vulnerability be used to manipulate votes of other users, hijack the moderators session or simply disturb the meeting. The vulnerability was introduced with 6eae497abeab234418dfbd9d299e831eff86ed45 on 16.04.2020, which is first included in the 3.2 release. It has been patched in version 3.3 ( in commit f3809fc8a97ee305d721662a75f788f9e9d21938, merged in master on 20.11.2020)." } ] }, diff --git a/2020/26xxx/CVE-2020-26867.json b/2020/26xxx/CVE-2020-26867.json index 8ddcdce603c..edcb67b824d 100644 --- a/2020/26xxx/CVE-2020-26867.json +++ b/2020/26xxx/CVE-2020-26867.json @@ -94,6 +94,11 @@ "refsource": "CONFIRM", "name": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/", "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1", + "url": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1" } ] }, diff --git a/2020/26xxx/CVE-2020-26868.json b/2020/26xxx/CVE-2020-26868.json index ded58053aba..6cb13baedde 100644 --- a/2020/26xxx/CVE-2020-26868.json +++ b/2020/26xxx/CVE-2020-26868.json @@ -94,6 +94,11 @@ "refsource": "CONFIRM", "name": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/", "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1", + "url": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1" } ] }, diff --git a/2020/26xxx/CVE-2020-26869.json b/2020/26xxx/CVE-2020-26869.json index bbb726e64e5..3919f5371ac 100644 --- a/2020/26xxx/CVE-2020-26869.json +++ b/2020/26xxx/CVE-2020-26869.json @@ -94,6 +94,11 @@ "refsource": "CONFIRM", "name": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/", "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1", + "url": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1" } ] }, diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 8c41909fcdd..2675029f794 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -280,6 +280,21 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20201218 [jira] [Updated] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20201218 [jira] [Assigned] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20201218 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/27xxx/CVE-2020-27687.json b/2020/27xxx/CVE-2020-27687.json index eb0ef8d9a16..4e5bb531661 100644 --- a/2020/27xxx/CVE-2020-27687.json +++ b/2020/27xxx/CVE-2020-27687.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27687", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27687", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ThingsBoard before v3.2 is vulnerable to Host header injection in password-reset emails. This allows an attacker to send malicious links in password-reset emails to victims, pointing to an attacker-controlled server. Lack of validation of the Host header allows this to happen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/thingsboard/thingsboard/commits/master", + "refsource": "MISC", + "name": "https://github.com/thingsboard/thingsboard/commits/master" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936", + "url": "https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936" } ] } diff --git a/2020/35xxx/CVE-2020-35556.json b/2020/35xxx/CVE-2020-35556.json new file mode 100644 index 00000000000..5d7a7f6cb65 --- /dev/null +++ b/2020/35xxx/CVE-2020-35556.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35556", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35557.json b/2020/35xxx/CVE-2020-35557.json new file mode 100644 index 00000000000..5f8db1805d1 --- /dev/null +++ b/2020/35xxx/CVE-2020-35557.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35557", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35558.json b/2020/35xxx/CVE-2020-35558.json new file mode 100644 index 00000000000..2af8fdf9e38 --- /dev/null +++ b/2020/35xxx/CVE-2020-35558.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35558", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35559.json b/2020/35xxx/CVE-2020-35559.json new file mode 100644 index 00000000000..3361fee96d2 --- /dev/null +++ b/2020/35xxx/CVE-2020-35559.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35559", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35560.json b/2020/35xxx/CVE-2020-35560.json new file mode 100644 index 00000000000..6f221cb6b36 --- /dev/null +++ b/2020/35xxx/CVE-2020-35560.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35560", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35561.json b/2020/35xxx/CVE-2020-35561.json new file mode 100644 index 00000000000..2e19c888130 --- /dev/null +++ b/2020/35xxx/CVE-2020-35561.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35561", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35562.json b/2020/35xxx/CVE-2020-35562.json new file mode 100644 index 00000000000..48424c1d44f --- /dev/null +++ b/2020/35xxx/CVE-2020-35562.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35562", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35563.json b/2020/35xxx/CVE-2020-35563.json new file mode 100644 index 00000000000..d27322aa03f --- /dev/null +++ b/2020/35xxx/CVE-2020-35563.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35563", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35564.json b/2020/35xxx/CVE-2020-35564.json new file mode 100644 index 00000000000..13e32b5bf7f --- /dev/null +++ b/2020/35xxx/CVE-2020-35564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35564", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35565.json b/2020/35xxx/CVE-2020-35565.json new file mode 100644 index 00000000000..ffa2345785a --- /dev/null +++ b/2020/35xxx/CVE-2020-35565.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35565", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35566.json b/2020/35xxx/CVE-2020-35566.json new file mode 100644 index 00000000000..3e11b79a447 --- /dev/null +++ b/2020/35xxx/CVE-2020-35566.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35566", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35567.json b/2020/35xxx/CVE-2020-35567.json new file mode 100644 index 00000000000..aad66fd8422 --- /dev/null +++ b/2020/35xxx/CVE-2020-35567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35567", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35568.json b/2020/35xxx/CVE-2020-35568.json new file mode 100644 index 00000000000..810f925648d --- /dev/null +++ b/2020/35xxx/CVE-2020-35568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35569.json b/2020/35xxx/CVE-2020-35569.json new file mode 100644 index 00000000000..839e496b89c --- /dev/null +++ b/2020/35xxx/CVE-2020-35569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35570.json b/2020/35xxx/CVE-2020-35570.json new file mode 100644 index 00000000000..1bbab23d4cb --- /dev/null +++ b/2020/35xxx/CVE-2020-35570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file