diff --git a/2019/12xxx/CVE-2019-12518.json b/2019/12xxx/CVE-2019-12518.json index 13fb82f3c88..a4522c82785 100644 --- a/2019/12xxx/CVE-2019-12518.json +++ b/2019/12xxx/CVE-2019-12518.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html", "url": "https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156335/Anviz-CrossChex-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/156335/Anviz-CrossChex-Buffer-Overflow.html" } ] } diff --git a/2020/8xxx/CVE-2020-8595.json b/2020/8xxx/CVE-2020-8595.json index d523b00d7d2..f1c27190f6f 100644 --- a/2020/8xxx/CVE-2020-8595.json +++ b/2020/8xxx/CVE-2020-8595.json @@ -62,6 +62,11 @@ "refsource": "MISC", "name": "https://istio.io/news/security/" }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0477", + "url": "https://access.redhat.com/errata/RHSA-2020:0477" + }, { "refsource": "CONFIRM", "name": "https://access.redhat.com/security/cve/cve-2020-8595", diff --git a/2020/8xxx/CVE-2020-8800.json b/2020/8xxx/CVE-2020-8800.json index bb94c722847..207a10dc158 100644 --- a/2020/8xxx/CVE-2020-8800.json +++ b/2020/8xxx/CVE-2020-8800.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://seclists.org/fulldisclosure/2020/Feb/3", "url": "https://seclists.org/fulldisclosure/2020/Feb/3" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html", + "url": "http://packetstormsecurity.com/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html" } ] } diff --git a/2020/8xxx/CVE-2020-8801.json b/2020/8xxx/CVE-2020-8801.json index 8410719aaee..97d2fef23d1 100644 --- a/2020/8xxx/CVE-2020-8801.json +++ b/2020/8xxx/CVE-2020-8801.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2020/Feb/4", "url": "http://seclists.org/fulldisclosure/2020/Feb/4" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html", + "url": "http://packetstormsecurity.com/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html" } ] } diff --git a/2020/8xxx/CVE-2020-8802.json b/2020/8xxx/CVE-2020-8802.json index e546d994445..1dc4d7bd149 100644 --- a/2020/8xxx/CVE-2020-8802.json +++ b/2020/8xxx/CVE-2020-8802.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2020/Feb/5", "url": "http://seclists.org/fulldisclosure/2020/Feb/5" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html", + "url": "http://packetstormsecurity.com/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html" } ] } diff --git a/2020/8xxx/CVE-2020-8803.json b/2020/8xxx/CVE-2020-8803.json index e765ca90b04..3b077659afc 100644 --- a/2020/8xxx/CVE-2020-8803.json +++ b/2020/8xxx/CVE-2020-8803.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2020/Feb/6", "url": "http://seclists.org/fulldisclosure/2020/Feb/6" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html", + "url": "http://packetstormsecurity.com/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html" } ] } diff --git a/2020/8xxx/CVE-2020-8804.json b/2020/8xxx/CVE-2020-8804.json index 5bf9113e2e7..1e807fa628e 100644 --- a/2020/8xxx/CVE-2020-8804.json +++ b/2020/8xxx/CVE-2020-8804.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2020/Feb/7", "url": "http://seclists.org/fulldisclosure/2020/Feb/7" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156331/SuiteCRM-7.11.10-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/156331/SuiteCRM-7.11.10-SQL-Injection.html" } ] } diff --git a/2020/8xxx/CVE-2020-8947.json b/2020/8xxx/CVE-2020-8947.json index 10d5fa8017b..6434ca572e7 100644 --- a/2020/8xxx/CVE-2020-8947.json +++ b/2020/8xxx/CVE-2020-8947.json @@ -61,6 +61,11 @@ "url": "https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/pandorafms-rce.html", "refsource": "MISC", "name": "https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/pandorafms-rce.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html" } ] } diff --git a/2020/8xxx/CVE-2020-8982.json b/2020/8xxx/CVE-2020-8982.json new file mode 100644 index 00000000000..fc71a9a7f0b --- /dev/null +++ b/2020/8xxx/CVE-2020-8982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8983.json b/2020/8xxx/CVE-2020-8983.json new file mode 100644 index 00000000000..eaeb8110173 --- /dev/null +++ b/2020/8xxx/CVE-2020-8983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8984.json b/2020/8xxx/CVE-2020-8984.json new file mode 100644 index 00000000000..4017f143932 --- /dev/null +++ b/2020/8xxx/CVE-2020-8984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8985.json b/2020/8xxx/CVE-2020-8985.json new file mode 100644 index 00000000000..a79f27f4b0e --- /dev/null +++ b/2020/8xxx/CVE-2020-8985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8986.json b/2020/8xxx/CVE-2020-8986.json new file mode 100644 index 00000000000..a81bdc4733e --- /dev/null +++ b/2020/8xxx/CVE-2020-8986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file