From fda204eb125f1bb9d9fac2e54a098f3ab910ac5b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 17 Dec 2019 14:01:30 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/8xxx/CVE-2014-8178.json | 80 ++++++++++++++++++++++++++++++++-- 2019/18xxx/CVE-2019-18824.json | 67 ++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18825.json | 67 ++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18829.json | 67 ++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18832.json | 67 ++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18833.json | 67 ++++++++++++++++++++++++++++ 2019/19xxx/CVE-2019-19264.json | 56 +++++++++++++++++++++--- 2019/19xxx/CVE-2019-19712.json | 61 +++++++++++++++++++++++--- 2020/3xxx/CVE-2020-3701.json | 18 ++++++++ 2020/3xxx/CVE-2020-3702.json | 18 ++++++++ 2020/3xxx/CVE-2020-3703.json | 18 ++++++++ 2020/3xxx/CVE-2020-3704.json | 18 ++++++++ 2020/3xxx/CVE-2020-3705.json | 18 ++++++++ 2020/3xxx/CVE-2020-3706.json | 18 ++++++++ 2020/3xxx/CVE-2020-3707.json | 18 ++++++++ 2020/3xxx/CVE-2020-3708.json | 18 ++++++++ 2020/3xxx/CVE-2020-3709.json | 18 ++++++++ 17 files changed, 679 insertions(+), 15 deletions(-) create mode 100644 2019/18xxx/CVE-2019-18824.json create mode 100644 2019/18xxx/CVE-2019-18825.json create mode 100644 2019/18xxx/CVE-2019-18829.json create mode 100644 2019/18xxx/CVE-2019-18832.json create mode 100644 2019/18xxx/CVE-2019-18833.json create mode 100644 2020/3xxx/CVE-2020-3701.json create mode 100644 2020/3xxx/CVE-2020-3702.json create mode 100644 2020/3xxx/CVE-2020-3703.json create mode 100644 2020/3xxx/CVE-2020-3704.json create mode 100644 2020/3xxx/CVE-2020-3705.json create mode 100644 2020/3xxx/CVE-2020-3706.json create mode 100644 2020/3xxx/CVE-2020-3707.json create mode 100644 2020/3xxx/CVE-2020-3708.json create mode 100644 2020/3xxx/CVE-2020-3709.json diff --git a/2014/8xxx/CVE-2014-8178.json b/2014/8xxx/CVE-2014-8178.json index 421d2f98b03..c402c99f5ad 100644 --- a/2014/8xxx/CVE-2014-8178.json +++ b/2014/8xxx/CVE-2014-8178.json @@ -1,8 +1,8 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-8178", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,81 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Other" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Docker", + "product": { + "product_data": [ + { + "product_name": "Docker Engine", + "version": { + "version_data": [ + { + "version_value": "before 1.8.3" + } + ] + } + }, + { + "product_name": "CS Docker Engine", + "version": { + "version_data": [ + { + "version_value": "before 1.6.2-CS7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00036.html", + "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00036.html" + }, + { + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html", + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html" + }, + { + "refsource": "MISC", + "name": "https://groups.google.com/forum/#!msg/docker-dev/bWVVtLNbFy8/UaefOqMOCAAJ", + "url": "https://groups.google.com/forum/#!msg/docker-dev/bWVVtLNbFy8/UaefOqMOCAAJ" + }, + { + "refsource": "MISC", + "name": "https://github.com/docker/docker/blob/master/CHANGELOG.md#183-2015-10-12", + "url": "https://github.com/docker/docker/blob/master/CHANGELOG.md#183-2015-10-12" + }, + { + "refsource": "CONFIRM", + "name": "https://www.docker.com/legal/docker-cve-database", + "url": "https://www.docker.com/legal/docker-cve-database" } ] } diff --git a/2019/18xxx/CVE-2019-18824.json b/2019/18xxx/CVE-2019-18824.json new file mode 100644 index 00000000000..8d5a5b1cb18 --- /dev/null +++ b/2019/18xxx/CVE-2019-18824.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18824", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 have Missing Support for Integrity Check. The ClickShare Button does not verify the integrity of the mutable content on the UBIFS partition before being used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18825.json b/2019/18xxx/CVE-2019-18825.json new file mode 100644 index 00000000000..3eaad05ff40 --- /dev/null +++ b/2019/18xxx/CVE-2019-18825.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18825", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Huddle CS-100 devices before 1.9.0 and CSE-200 devices before 1.9.0 have incorrect Credentials Management. The ClickShare Base Unit implements encryption at rest using encryption keys which are shared across all ClickShare Base Units of models CS-100 & CSE-200." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18829.json b/2019/18xxx/CVE-2019-18829.json new file mode 100644 index 00000000000..fef079a8157 --- /dev/null +++ b/2019/18xxx/CVE-2019-18829.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18829", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 have Missing Support for Integrity Check. The Barco signed 'Clickshare_For_Windows.exe' binary on the ClickShare Button (R9861500D01) loads a number of DLL files dynamically without verifying their integrity." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18832.json b/2019/18xxx/CVE-2019-18832.json new file mode 100644 index 00000000000..8ad03f4875a --- /dev/null +++ b/2019/18xxx/CVE-2019-18832.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18832", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 have incorrect Credentials Management. The ClickShare Button implements encryption at rest which uses a one-time programmable (OTP) AES encryption key. This key is shared across all ClickShare Buttons of model R9861500D01." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18833.json b/2019/18xxx/CVE-2019-18833.json new file mode 100644 index 00000000000..76e25959b83 --- /dev/null +++ b/2019/18xxx/CVE-2019-18833.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18833", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 allow Information exposure (issue 2 of 2).. The encryption key of the media content which is shared between a ClickShare Button and a ClickShare Base Unit is randomly generated for each new session and communicated over a TLS connection. An attacker who is able to perform a Man-in-the-Middle attack between the TLS connection, is able to obtain the encryption key." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19264.json b/2019/19xxx/CVE-2019-19264.json index 5139543bd2d..d0af1d478fd 100644 --- a/2019/19xxx/CVE-2019-19264.json +++ b/2019/19xxx/CVE-2019-19264.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19264", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19264", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Simplifile RecordFusion through 2019-11-25, the logs and hist parameters allow remote attackers to access local files via a logger/logs?/../ or logger/hist?/../ URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.securenetworkinc.com/news/2019/11/26/recordfusion-local-file-inclusion-vulnerability-cve-2019-19264", + "url": "https://www.securenetworkinc.com/news/2019/11/26/recordfusion-local-file-inclusion-vulnerability-cve-2019-19264" } ] } diff --git a/2019/19xxx/CVE-2019-19712.json b/2019/19xxx/CVE-2019-19712.json index c56753a87db..1c989280291 100644 --- a/2019/19xxx/CVE-2019-19712.json +++ b/2019/19xxx/CVE-2019-19712.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19712", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19712", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://contao.org/en/news.html", + "refsource": "MISC", + "name": "https://contao.org/en/news.html" + }, + { + "refsource": "CONFIRM", + "name": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html", + "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ] } diff --git a/2020/3xxx/CVE-2020-3701.json b/2020/3xxx/CVE-2020-3701.json new file mode 100644 index 00000000000..4b10a478d23 --- /dev/null +++ b/2020/3xxx/CVE-2020-3701.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3701", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3702.json b/2020/3xxx/CVE-2020-3702.json new file mode 100644 index 00000000000..70c168a88b6 --- /dev/null +++ b/2020/3xxx/CVE-2020-3702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3703.json b/2020/3xxx/CVE-2020-3703.json new file mode 100644 index 00000000000..4a8ff9827ce --- /dev/null +++ b/2020/3xxx/CVE-2020-3703.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3703", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3704.json b/2020/3xxx/CVE-2020-3704.json new file mode 100644 index 00000000000..e64afa40295 --- /dev/null +++ b/2020/3xxx/CVE-2020-3704.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3704", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3705.json b/2020/3xxx/CVE-2020-3705.json new file mode 100644 index 00000000000..7d9bcd42455 --- /dev/null +++ b/2020/3xxx/CVE-2020-3705.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3705", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3706.json b/2020/3xxx/CVE-2020-3706.json new file mode 100644 index 00000000000..1f663ed1e26 --- /dev/null +++ b/2020/3xxx/CVE-2020-3706.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3706", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3707.json b/2020/3xxx/CVE-2020-3707.json new file mode 100644 index 00000000000..45476737e28 --- /dev/null +++ b/2020/3xxx/CVE-2020-3707.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3707", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3708.json b/2020/3xxx/CVE-2020-3708.json new file mode 100644 index 00000000000..877207c07b5 --- /dev/null +++ b/2020/3xxx/CVE-2020-3708.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3708", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3709.json b/2020/3xxx/CVE-2020-3709.json new file mode 100644 index 00000000000..8f8e8208c74 --- /dev/null +++ b/2020/3xxx/CVE-2020-3709.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-3709", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file