From 2d06ee876a05260f2cf3a689c437597e49fc8ed4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 25 Mar 2020 17:01:27 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/16xxx/CVE-2019-16285.json | 5 +++ 2019/16xxx/CVE-2019-16286.json | 5 +++ 2019/16xxx/CVE-2019-16287.json | 5 +++ 2019/18xxx/CVE-2019-18909.json | 5 +++ 2019/18xxx/CVE-2019-18910.json | 5 +++ 2019/19xxx/CVE-2019-19127.json | 5 +++ 2019/20xxx/CVE-2019-20633.json | 62 +++++++++++++++++++++++++++++ 2019/7xxx/CVE-2019-7240.json | 48 ++++++++++++++++++++++- 2019/7xxx/CVE-2019-7244.json | 48 ++++++++++++++++++++++- 2019/7xxx/CVE-2019-7245.json | 48 ++++++++++++++++++++++- 2019/7xxx/CVE-2019-7630.json | 48 ++++++++++++++++++++++- 2020/0xxx/CVE-2020-0022.json | 5 +++ 2020/10xxx/CVE-2020-10385.json | 5 +++ 2020/10xxx/CVE-2020-10649.json | 71 +++++++++++++++++++++++++++++++--- 2020/10xxx/CVE-2020-10948.json | 18 +++++++++ 2020/10xxx/CVE-2020-10949.json | 18 +++++++++ 2020/10xxx/CVE-2020-10950.json | 18 +++++++++ 2020/2xxx/CVE-2020-2160.json | 3 +- 2020/2xxx/CVE-2020-2161.json | 3 +- 2020/2xxx/CVE-2020-2162.json | 3 +- 2020/2xxx/CVE-2020-2163.json | 3 +- 2020/2xxx/CVE-2020-2164.json | 3 +- 2020/2xxx/CVE-2020-2165.json | 3 +- 2020/2xxx/CVE-2020-2166.json | 3 +- 2020/2xxx/CVE-2020-2167.json | 3 +- 2020/2xxx/CVE-2020-2168.json | 3 +- 2020/2xxx/CVE-2020-2169.json | 3 +- 2020/2xxx/CVE-2020-2170.json | 3 +- 2020/2xxx/CVE-2020-2171.json | 3 +- 29 files changed, 429 insertions(+), 26 deletions(-) create mode 100644 2019/20xxx/CVE-2019-20633.json create mode 100644 2020/10xxx/CVE-2020-10948.json create mode 100644 2020/10xxx/CVE-2020-10949.json create mode 100644 2020/10xxx/CVE-2020-10950.json diff --git a/2019/16xxx/CVE-2019-16285.json b/2019/16xxx/CVE-2019-16285.json index 8af544ea453..864509b194e 100644 --- a/2019/16xxx/CVE-2019-16285.json +++ b/2019/16xxx/CVE-2019-16285.json @@ -62,6 +62,11 @@ "refsource": "FULLDISC", "name": "20200324 HP ThinPro - Information disclosure", "url": "http://seclists.org/fulldisclosure/2020/Mar/30" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156895/HP-ThinPro-6.x-7.x-Information-Disclosure.html", + "url": "http://packetstormsecurity.com/files/156895/HP-ThinPro-6.x-7.x-Information-Disclosure.html" } ] }, diff --git a/2019/16xxx/CVE-2019-16286.json b/2019/16xxx/CVE-2019-16286.json index 098ee8b2929..373e0a855da 100644 --- a/2019/16xxx/CVE-2019-16286.json +++ b/2019/16xxx/CVE-2019-16286.json @@ -62,6 +62,11 @@ "refsource": "FULLDISC", "name": "20200324 HP ThinPro - Application filter bypass", "url": "http://seclists.org/fulldisclosure/2020/Mar/37" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html", + "url": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html" } ] }, diff --git a/2019/16xxx/CVE-2019-16287.json b/2019/16xxx/CVE-2019-16287.json index 0780aab0eef..4faff58b2f6 100644 --- a/2019/16xxx/CVE-2019-16287.json +++ b/2019/16xxx/CVE-2019-16287.json @@ -62,6 +62,11 @@ "refsource": "FULLDISC", "name": "20200324 HP ThinPro - Privilege escalation", "url": "http://seclists.org/fulldisclosure/2020/Mar/38" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html" } ] }, diff --git a/2019/18xxx/CVE-2019-18909.json b/2019/18xxx/CVE-2019-18909.json index d17c849ab67..6f989ba14ed 100644 --- a/2019/18xxx/CVE-2019-18909.json +++ b/2019/18xxx/CVE-2019-18909.json @@ -62,6 +62,11 @@ "refsource": "FULLDISC", "name": "20200324 HP ThinPro - Citrix command injection", "url": "http://seclists.org/fulldisclosure/2020/Mar/39" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156907/HP-ThinPro-6.x-7.x-Citrix-Command-Injection.html", + "url": "http://packetstormsecurity.com/files/156907/HP-ThinPro-6.x-7.x-Citrix-Command-Injection.html" } ] }, diff --git a/2019/18xxx/CVE-2019-18910.json b/2019/18xxx/CVE-2019-18910.json index 60cd70ceefc..cc47827a0c7 100644 --- a/2019/18xxx/CVE-2019-18910.json +++ b/2019/18xxx/CVE-2019-18910.json @@ -62,6 +62,11 @@ "refsource": "FULLDISC", "name": "20200324 HP ThinPro - Privileged command injection", "url": "http://seclists.org/fulldisclosure/2020/Mar/40" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html", + "url": "http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html" } ] }, diff --git a/2019/19xxx/CVE-2019-19127.json b/2019/19xxx/CVE-2019-19127.json index b4f4f33a300..f73a4472625 100644 --- a/2019/19xxx/CVE-2019-19127.json +++ b/2019/19xxx/CVE-2019-19127.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2020/Mar/26", "url": "http://seclists.org/fulldisclosure/2020/Mar/26" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html" } ] } diff --git a/2019/20xxx/CVE-2019-20633.json b/2019/20xxx/CVE-2019-20633.json new file mode 100644 index 00000000000..b3e46d4ff16 --- /dev/null +++ b/2019/20xxx/CVE-2019-20633.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-20633", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://savannah.gnu.org/bugs/index.php?56683", + "refsource": "MISC", + "name": "https://savannah.gnu.org/bugs/index.php?56683" + } + ] + } +} \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7240.json b/2019/7xxx/CVE-2019-7240.json index 83d7369882a..07512c28bfd 100644 --- a/2019/7xxx/CVE-2019-7240.json +++ b/2019/7xxx/CVE-2019-7240.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7240", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in WinRing0x64.sys in Moo0 System Monitor 1.83. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x9C402088 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0004/FEYE-2019-0004.md", + "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0004/FEYE-2019-0004.md" } ] } diff --git a/2019/7xxx/CVE-2019-7244.json b/2019/7xxx/CVE-2019-7244.json index d1d6ec0c233..2fa7ea9fb9a 100644 --- a/2019/7xxx/CVE-2019-7244.json +++ b/2019/7xxx/CVE-2019-7244.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7244", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in kerneld.sys in AIDA64 before 5.99. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x80112084 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0010/FEYE-2019-0010.md", + "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0010/FEYE-2019-0010.md" } ] } diff --git a/2019/7xxx/CVE-2019-7245.json b/2019/7xxx/CVE-2019-7245.json index 56fa007f3c7..99eb6020ccd 100644 --- a/2019/7xxx/CVE-2019-7245.json +++ b/2019/7xxx/CVE-2019-7245.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7245", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in GPU-Z.sys in TechPowerUp GPU-Z before 2.23.0. The vulnerable driver exposes a wrmsr instruction via an IOCTL and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0002/FEYE-2019-0002.md", + "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0002/FEYE-2019-0002.md" } ] } diff --git a/2019/7xxx/CVE-2019-7630.json b/2019/7xxx/CVE-2019-7630.json index 5f10194404c..46c53f0b1e4 100644 --- a/2019/7xxx/CVE-2019-7630.json +++ b/2019/7xxx/CVE-2019-7630.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7630", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in gdrv.sys in Gigabyte APP Center before 19.0227.1. The vulnerable driver exposes a wrmsr instruction via IOCTL 0xC3502580 and does not properly filter the target Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0003/FEYE-2019-0003.md", + "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0003/FEYE-2019-0003.md" } ] } diff --git a/2020/0xxx/CVE-2020-0022.json b/2020/0xxx/CVE-2020-0022.json index 8bbd714ec38..50fd338faa9 100644 --- a/2020/0xxx/CVE-2020-0022.json +++ b/2020/0xxx/CVE-2020-0022.json @@ -53,6 +53,11 @@ "refsource": "FULLDISC", "name": "20200214 Re: [FD] Critical Bluetooth Vulnerability in Android (CVE-2020-0022) - BlueFrag", "url": "http://seclists.org/fulldisclosure/2020/Feb/10" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html", + "url": "http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10385.json b/2020/10xxx/CVE-2020-10385.json index 77ab424854e..6486102f890 100644 --- a/2020/10xxx/CVE-2020-10385.json +++ b/2020/10xxx/CVE-2020-10385.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/156874/WordPress-WPForms-1.5.9-Cross-Site-Scripting.html", "url": "http://packetstormsecurity.com/files/156874/WordPress-WPForms-1.5.9-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156910/WordPress-WP-Forms-1.5.8.2-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/156910/WordPress-WP-Forms-1.5.8.2-Cross-Site-Scripting.html" } ] } diff --git a/2020/10xxx/CVE-2020-10649.json b/2020/10xxx/CVE-2020-10649.json index 5552eb057c7..be59b35e3a8 100644 --- a/2020/10xxx/CVE-2020-10649.json +++ b/2020/10xxx/CVE-2020-10649.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-10649", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-10649", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DevActSvc.exe in ASUS Device Activation before 1.0.7.0 for Windows 10 notebooks and PCs could lead to unsigned code execution with no additional restrictions when a user puts an application at a particular path with a particular file name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/", + "refsource": "MISC", + "name": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/" + }, + { + "url": "https://www.asus.com/support/FAQ/1042640/", + "refsource": "MISC", + "name": "https://www.asus.com/support/FAQ/1042640/" + }, + { + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1Ap293b7bZLen6DmheppR1IUFEAsCSORC/view?usp=sharing", + "url": "https://drive.google.com/file/d/1Ap293b7bZLen6DmheppR1IUFEAsCSORC/view?usp=sharing" + }, + { + "refsource": "MISC", + "name": "https://www.asus.com/Laptops/ASUS-TUF-Gaming-FX504/HelpDesk_Download/", + "url": "https://www.asus.com/Laptops/ASUS-TUF-Gaming-FX504/HelpDesk_Download/" } ] } diff --git a/2020/10xxx/CVE-2020-10948.json b/2020/10xxx/CVE-2020-10948.json new file mode 100644 index 00000000000..b3eed6a82ed --- /dev/null +++ b/2020/10xxx/CVE-2020-10948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10949.json b/2020/10xxx/CVE-2020-10949.json new file mode 100644 index 00000000000..f730f8ad99a --- /dev/null +++ b/2020/10xxx/CVE-2020-10949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10950.json b/2020/10xxx/CVE-2020-10950.json new file mode 100644 index 00000000000..91e44710497 --- /dev/null +++ b/2020/10xxx/CVE-2020-10950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-10950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/2xxx/CVE-2020-2160.json b/2020/2xxx/CVE-2020-2160.json index 906d959922a..20933ceb357 100644 --- a/2020/2xxx/CVE-2020-2160.json +++ b/2020/2xxx/CVE-2020-2160.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2160", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2161.json b/2020/2xxx/CVE-2020-2161.json index fac7b8f89e0..b28fa8a4dc9 100644 --- a/2020/2xxx/CVE-2020-2161.json +++ b/2020/2xxx/CVE-2020-2161.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2161", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2162.json b/2020/2xxx/CVE-2020-2162.json index 0ae4d7505e9..577c37c0ba8 100644 --- a/2020/2xxx/CVE-2020-2162.json +++ b/2020/2xxx/CVE-2020-2162.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2162", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2163.json b/2020/2xxx/CVE-2020-2163.json index ee6d323f328..62df8eb1580 100644 --- a/2020/2xxx/CVE-2020-2163.json +++ b/2020/2xxx/CVE-2020-2163.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2163", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2164.json b/2020/2xxx/CVE-2020-2164.json index e88281bf732..3b05f559441 100644 --- a/2020/2xxx/CVE-2020-2164.json +++ b/2020/2xxx/CVE-2020-2164.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2164", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2165.json b/2020/2xxx/CVE-2020-2165.json index 11d98badeb3..10be8ab10dc 100644 --- a/2020/2xxx/CVE-2020-2165.json +++ b/2020/2xxx/CVE-2020-2165.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2165", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2166.json b/2020/2xxx/CVE-2020-2166.json index 65b65384b89..fc4112e7705 100644 --- a/2020/2xxx/CVE-2020-2166.json +++ b/2020/2xxx/CVE-2020-2166.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2166", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2167.json b/2020/2xxx/CVE-2020-2167.json index 866ba852dea..7cc524a8386 100644 --- a/2020/2xxx/CVE-2020-2167.json +++ b/2020/2xxx/CVE-2020-2167.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2167", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2168.json b/2020/2xxx/CVE-2020-2168.json index d394b9d1e93..4761d8117fb 100644 --- a/2020/2xxx/CVE-2020-2168.json +++ b/2020/2xxx/CVE-2020-2168.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2168", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2169.json b/2020/2xxx/CVE-2020-2169.json index 4e28edd8f1d..f599a01006a 100644 --- a/2020/2xxx/CVE-2020-2169.json +++ b/2020/2xxx/CVE-2020-2169.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2169", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2170.json b/2020/2xxx/CVE-2020-2170.json index ea7acb615c4..ada2564fb47 100644 --- a/2020/2xxx/CVE-2020-2170.json +++ b/2020/2xxx/CVE-2020-2170.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2170", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2020/2xxx/CVE-2020-2171.json b/2020/2xxx/CVE-2020-2171.json index 49d75a1e5a8..77863d2d544 100644 --- a/2020/2xxx/CVE-2020-2171.json +++ b/2020/2xxx/CVE-2020-2171.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2020-2171", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": {