diff --git a/2019/18xxx/CVE-2019-18814.json b/2019/18xxx/CVE-2019-18814.json index 70670e1398c..45a0989cb5c 100644 --- a/2019/18xxx/CVE-2019-18814.json +++ b/2019/18xxx/CVE-2019-18814.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20191205-0001/", "url": "https://security.netapp.com/advisory/ntap-20191205-0001/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" } ] } diff --git a/2019/18xxx/CVE-2019-18885.json b/2019/18xxx/CVE-2019-18885.json index c0bdabcf827..a847b6222fe 100644 --- a/2019/18xxx/CVE-2019-18885.json +++ b/2019/18xxx/CVE-2019-18885.json @@ -101,6 +101,11 @@ "refsource": "UBUNTU", "name": "USN-4287-2", "url": "https://usn.ubuntu.com/4287-2/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" } ] } diff --git a/2019/20xxx/CVE-2019-20810.json b/2019/20xxx/CVE-2019-20810.json index bdf55a50215..c6e93d40ba9 100644 --- a/2019/20xxx/CVE-2019-20810.json +++ b/2019/20xxx/CVE-2019-20810.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1153", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" } ] } diff --git a/2020/12xxx/CVE-2020-12106.json b/2020/12xxx/CVE-2020-12106.json index 9ac940e1b30..716f8a411a2 100644 --- a/2020/12xxx/CVE-2020-12106.json +++ b/2020/12xxx/CVE-2020-12106.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12106", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12106", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows unauthenticated users to send HTTP POST request to several critical Administrative functions such as, changing credentials of the Administrator account or connect the product to a rogue access point." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.stengg.com/cybersecurity", + "refsource": "MISC", + "name": "https://www.stengg.com/cybersecurity" + }, + { + "refsource": "MISC", + "name": "https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf", + "url": "https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf" } ] } diff --git a/2020/12xxx/CVE-2020-12107.json b/2020/12xxx/CVE-2020-12107.json index 57054277e5d..4ede5050715 100644 --- a/2020/12xxx/CVE-2020-12107.json +++ b/2020/12xxx/CVE-2020-12107.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12107", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12107", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows command injection via a text field, which allow full control over this module's Operating System." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.stengg.com/cybersecurity", + "refsource": "MISC", + "name": "https://www.stengg.com/cybersecurity" + }, + { + "refsource": "MISC", + "name": "https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf", + "url": "https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf" } ] } diff --git a/2020/12xxx/CVE-2020-12655.json b/2020/12xxx/CVE-2020-12655.json index fadbc52687e..1b8a90d8223 100644 --- a/2020/12xxx/CVE-2020-12655.json +++ b/2020/12xxx/CVE-2020-12655.json @@ -91,6 +91,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0801", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" } ] } diff --git a/2020/12xxx/CVE-2020-12771.json b/2020/12xxx/CVE-2020-12771.json index cc84c23a784..acdc9a271b9 100644 --- a/2020/12xxx/CVE-2020-12771.json +++ b/2020/12xxx/CVE-2020-12771.json @@ -71,6 +71,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1153", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" } ] } diff --git a/2020/13xxx/CVE-2020-13974.json b/2020/13xxx/CVE-2020-13974.json index 881028146e2..ec0fc1fc13c 100644 --- a/2020/13xxx/CVE-2020-13974.json +++ b/2020/13xxx/CVE-2020-13974.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1153", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" } ] } diff --git a/2020/15xxx/CVE-2020-15393.json b/2020/15xxx/CVE-2020-15393.json index 12e13940895..41e2dd2d56b 100644 --- a/2020/15xxx/CVE-2020-15393.json +++ b/2020/15xxx/CVE-2020-15393.json @@ -71,6 +71,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1153", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" } ] } diff --git a/2020/17xxx/CVE-2020-17508.json b/2020/17xxx/CVE-2020-17508.json new file mode 100644 index 00000000000..55f27a82a14 --- /dev/null +++ b/2020/17xxx/CVE-2020-17508.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17508", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17509.json b/2020/17xxx/CVE-2020-17509.json new file mode 100644 index 00000000000..0b954578e8d --- /dev/null +++ b/2020/17xxx/CVE-2020-17509.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17509", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17510.json b/2020/17xxx/CVE-2020-17510.json new file mode 100644 index 00000000000..b6451ef8630 --- /dev/null +++ b/2020/17xxx/CVE-2020-17510.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17510", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17511.json b/2020/17xxx/CVE-2020-17511.json new file mode 100644 index 00000000000..b10b704e3b0 --- /dev/null +++ b/2020/17xxx/CVE-2020-17511.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17511", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17512.json b/2020/17xxx/CVE-2020-17512.json new file mode 100644 index 00000000000..d51731b18d8 --- /dev/null +++ b/2020/17xxx/CVE-2020-17512.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17512", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17513.json b/2020/17xxx/CVE-2020-17513.json new file mode 100644 index 00000000000..f84993f1ea1 --- /dev/null +++ b/2020/17xxx/CVE-2020-17513.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17513", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17514.json b/2020/17xxx/CVE-2020-17514.json new file mode 100644 index 00000000000..e036d12b7f9 --- /dev/null +++ b/2020/17xxx/CVE-2020-17514.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17514", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17515.json b/2020/17xxx/CVE-2020-17515.json new file mode 100644 index 00000000000..80ef3b5c0da --- /dev/null +++ b/2020/17xxx/CVE-2020-17515.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17515", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17516.json b/2020/17xxx/CVE-2020-17516.json new file mode 100644 index 00000000000..780449002ae --- /dev/null +++ b/2020/17xxx/CVE-2020-17516.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17516", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17517.json b/2020/17xxx/CVE-2020-17517.json new file mode 100644 index 00000000000..671cc116699 --- /dev/null +++ b/2020/17xxx/CVE-2020-17517.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17517", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17518.json b/2020/17xxx/CVE-2020-17518.json new file mode 100644 index 00000000000..fc3f89bbcb9 --- /dev/null +++ b/2020/17xxx/CVE-2020-17518.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17518", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17519.json b/2020/17xxx/CVE-2020-17519.json new file mode 100644 index 00000000000..aeebb916875 --- /dev/null +++ b/2020/17xxx/CVE-2020-17519.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17519", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17520.json b/2020/17xxx/CVE-2020-17520.json new file mode 100644 index 00000000000..d1487c082df --- /dev/null +++ b/2020/17xxx/CVE-2020-17520.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17520", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17521.json b/2020/17xxx/CVE-2020-17521.json new file mode 100644 index 00000000000..34cff3efa5e --- /dev/null +++ b/2020/17xxx/CVE-2020-17521.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17521", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17522.json b/2020/17xxx/CVE-2020-17522.json new file mode 100644 index 00000000000..c7f997614ad --- /dev/null +++ b/2020/17xxx/CVE-2020-17522.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17522", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17523.json b/2020/17xxx/CVE-2020-17523.json new file mode 100644 index 00000000000..815738b13a4 --- /dev/null +++ b/2020/17xxx/CVE-2020-17523.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17523", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17524.json b/2020/17xxx/CVE-2020-17524.json new file mode 100644 index 00000000000..32fd9fd0b40 --- /dev/null +++ b/2020/17xxx/CVE-2020-17524.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17524", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17525.json b/2020/17xxx/CVE-2020-17525.json new file mode 100644 index 00000000000..33447275913 --- /dev/null +++ b/2020/17xxx/CVE-2020-17525.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17525", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17526.json b/2020/17xxx/CVE-2020-17526.json new file mode 100644 index 00000000000..2a048ad9491 --- /dev/null +++ b/2020/17xxx/CVE-2020-17526.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17526", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17527.json b/2020/17xxx/CVE-2020-17527.json new file mode 100644 index 00000000000..f9b29c0930d --- /dev/null +++ b/2020/17xxx/CVE-2020-17527.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17527", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17528.json b/2020/17xxx/CVE-2020-17528.json new file mode 100644 index 00000000000..5b8d1a6c9d2 --- /dev/null +++ b/2020/17xxx/CVE-2020-17528.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17528", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17529.json b/2020/17xxx/CVE-2020-17529.json new file mode 100644 index 00000000000..e08cefb1686 --- /dev/null +++ b/2020/17xxx/CVE-2020-17529.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17529", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17530.json b/2020/17xxx/CVE-2020-17530.json new file mode 100644 index 00000000000..5a4b8862f33 --- /dev/null +++ b/2020/17xxx/CVE-2020-17530.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17530", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17531.json b/2020/17xxx/CVE-2020-17531.json new file mode 100644 index 00000000000..09b0435a006 --- /dev/null +++ b/2020/17xxx/CVE-2020-17531.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17531", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17532.json b/2020/17xxx/CVE-2020-17532.json new file mode 100644 index 00000000000..2a04c6c000e --- /dev/null +++ b/2020/17xxx/CVE-2020-17532.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17532", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17533.json b/2020/17xxx/CVE-2020-17533.json new file mode 100644 index 00000000000..36eb12641aa --- /dev/null +++ b/2020/17xxx/CVE-2020-17533.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17533", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17534.json b/2020/17xxx/CVE-2020-17534.json new file mode 100644 index 00000000000..aa51e6632d8 --- /dev/null +++ b/2020/17xxx/CVE-2020-17534.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17534", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17535.json b/2020/17xxx/CVE-2020-17535.json new file mode 100644 index 00000000000..86f606843d7 --- /dev/null +++ b/2020/17xxx/CVE-2020-17535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17536.json b/2020/17xxx/CVE-2020-17536.json new file mode 100644 index 00000000000..97c5e680b2a --- /dev/null +++ b/2020/17xxx/CVE-2020-17536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17537.json b/2020/17xxx/CVE-2020-17537.json new file mode 100644 index 00000000000..3a3387900ec --- /dev/null +++ b/2020/17xxx/CVE-2020-17537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8904.json b/2020/8xxx/CVE-2020-8904.json index 992c2649104..ab45fcc08a0 100644 --- a/2020/8xxx/CVE-2020-8904.json +++ b/2020/8xxx/CVE-2020-8904.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "cve-coordination@google.com", + "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2020-07-22T00:22:00.000Z", "ID": "CVE-2020-8904", "STATE": "PUBLIC", @@ -91,5 +91,4 @@ "source": { "discovery": "EXTERNAL" } -} - +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8905.json b/2020/8xxx/CVE-2020-8905.json index 7e01528bd3e..b867c94229a 100644 --- a/2020/8xxx/CVE-2020-8905.json +++ b/2020/8xxx/CVE-2020-8905.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "cve-coordination@google.com", + "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2020-07-22T00:22:00.000Z", "ID": "CVE-2020-8905", "STATE": "PUBLIC", @@ -91,5 +91,4 @@ "source": { "discovery": "EXTERNAL" } -} - +} \ No newline at end of file