diff --git a/2005/1xxx/CVE-2005-1513.json b/2005/1xxx/CVE-2005-1513.json index b7d648a8604..4e833265732 100644 --- a/2005/1xxx/CVE-2005-1513.json +++ b/2005/1xxx/CVE-2005-1513.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[oss-security] 20200520 Re: Remote Code Execution in qmail (CVE-2005-1513)", "url": "http://www.openwall.com/lists/oss-security/2020/05/20/5" + }, + { + "refsource": "FULLDISC", + "name": "20200522 Remote Code Execution in qmail (CVE-2005-1513)", + "url": "http://seclists.org/fulldisclosure/2020/May/42" } ] } diff --git a/2005/1xxx/CVE-2005-1514.json b/2005/1xxx/CVE-2005-1514.json index b576fa79423..3080e7be0a3 100644 --- a/2005/1xxx/CVE-2005-1514.json +++ b/2005/1xxx/CVE-2005-1514.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[oss-security] 20200520 Re: Remote Code Execution in qmail (CVE-2005-1513)", "url": "http://www.openwall.com/lists/oss-security/2020/05/20/2" + }, + { + "refsource": "FULLDISC", + "name": "20200522 Remote Code Execution in qmail (CVE-2005-1513)", + "url": "http://seclists.org/fulldisclosure/2020/May/42" } ] } diff --git a/2005/1xxx/CVE-2005-1515.json b/2005/1xxx/CVE-2005-1515.json index b0c987ce17d..a3bbd21a46a 100644 --- a/2005/1xxx/CVE-2005-1515.json +++ b/2005/1xxx/CVE-2005-1515.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[oss-security] 20200520 Re: Remote Code Execution in qmail (CVE-2005-1513)", "url": "http://www.openwall.com/lists/oss-security/2020/05/20/2" + }, + { + "refsource": "FULLDISC", + "name": "20200522 Remote Code Execution in qmail (CVE-2005-1513)", + "url": "http://seclists.org/fulldisclosure/2020/May/42" } ] } diff --git a/2019/20xxx/CVE-2019-20805.json b/2019/20xxx/CVE-2019-20805.json new file mode 100644 index 00000000000..374adec3a3d --- /dev/null +++ b/2019/20xxx/CVE-2019-20805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11008.json b/2020/11xxx/CVE-2020-11008.json index 8964820420d..49b7673095f 100644 --- a/2020/11xxx/CVE-2020-11008.json +++ b/2020/11xxx/CVE-2020-11008.json @@ -150,6 +150,11 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211183", "url": "https://support.apple.com/kb/HT211183" + }, + { + "refsource": "FULLDISC", + "name": "20200522 APPLE-SA-2020-05-20-1 Xcode 11.5", + "url": "http://seclists.org/fulldisclosure/2020/May/41" } ] }, diff --git a/2020/11xxx/CVE-2020-11022.json b/2020/11xxx/CVE-2020-11022.json index 024212a79ac..dd9e40e831a 100644 --- a/2020/11xxx/CVE-2020-11022.json +++ b/2020/11xxx/CVE-2020-11022.json @@ -93,6 +93,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200511-0006/", "url": "https://security.netapp.com/advisory/ntap-20200511-0006/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.drupal.org/sa-core-2020-002", + "url": "https://www.drupal.org/sa-core-2020-002" } ] }, diff --git a/2020/11xxx/CVE-2020-11023.json b/2020/11xxx/CVE-2020-11023.json index c3ea7ee09a3..36200908187 100644 --- a/2020/11xxx/CVE-2020-11023.json +++ b/2020/11xxx/CVE-2020-11023.json @@ -88,6 +88,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200511-0006/", "url": "https://security.netapp.com/advisory/ntap-20200511-0006/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.drupal.org/sa-core-2020-002", + "url": "https://www.drupal.org/sa-core-2020-002" } ] }, diff --git a/2020/12xxx/CVE-2020-12397.json b/2020/12xxx/CVE-2020-12397.json index a7443741268..e5e49c27313 100644 --- a/2020/12xxx/CVE-2020-12397.json +++ b/2020/12xxx/CVE-2020-12397.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-12397", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_value": "68.8.0", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Sender Email Address Spoofing using encoded Unicode characters" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-18/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-18/" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1617370", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1617370" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "By encoding Unicode whitespace characters within the From email header, an attacker can spoof the sender email address that Thunderbird displays. This vulnerability affects Thunderbird < 68.8.0." } ] } diff --git a/2020/13xxx/CVE-2020-13402.json b/2020/13xxx/CVE-2020-13402.json new file mode 100644 index 00000000000..46f75d6ad07 --- /dev/null +++ b/2020/13xxx/CVE-2020-13402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13403.json b/2020/13xxx/CVE-2020-13403.json new file mode 100644 index 00000000000..9849b7b38ac --- /dev/null +++ b/2020/13xxx/CVE-2020-13403.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13403", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13404.json b/2020/13xxx/CVE-2020-13404.json new file mode 100644 index 00000000000..8d559f68c26 --- /dev/null +++ b/2020/13xxx/CVE-2020-13404.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13404", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13405.json b/2020/13xxx/CVE-2020-13405.json new file mode 100644 index 00000000000..2e4cc0c909c --- /dev/null +++ b/2020/13xxx/CVE-2020-13405.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13405", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8789.json b/2020/8xxx/CVE-2020-8789.json index ce8b9362256..8a0e56b6bf3 100644 --- a/2020/8xxx/CVE-2020-8789.json +++ b/2020/8xxx/CVE-2020-8789.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157787/Composr-CMS-10.0.30-Cross-Site-Scripting.html", "url": "http://packetstormsecurity.com/files/157787/Composr-CMS-10.0.30-Cross-Site-Scripting.html" + }, + { + "refsource": "FULLDISC", + "name": "20200522 Composr CMS 10.0.30 - (Authenticated) Cross-Site Scripting", + "url": "http://seclists.org/fulldisclosure/2020/May/39" } ] }