diff --git a/2020/14xxx/CVE-2020-14672.json b/2020/14xxx/CVE-2020-14672.json index 79895020399..77e409434b0 100644 --- a/2020/14xxx/CVE-2020-14672.json +++ b/2020/14xxx/CVE-2020-14672.json @@ -77,6 +77,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14765.json b/2020/14xxx/CVE-2020-14765.json index 98b924cfb5a..73541931220 100644 --- a/2020/14xxx/CVE-2020-14765.json +++ b/2020/14xxx/CVE-2020-14765.json @@ -77,6 +77,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-4f9ee82bc5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" } ] } diff --git a/2020/14xxx/CVE-2020-14769.json b/2020/14xxx/CVE-2020-14769.json index fc1d7e0d2f0..70ea1ad1e19 100644 --- a/2020/14xxx/CVE-2020-14769.json +++ b/2020/14xxx/CVE-2020-14769.json @@ -77,6 +77,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14773.json b/2020/14xxx/CVE-2020-14773.json index 456c42f2c2c..3ccc34a94ee 100644 --- a/2020/14xxx/CVE-2020-14773.json +++ b/2020/14xxx/CVE-2020-14773.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14775.json b/2020/14xxx/CVE-2020-14775.json index 655dff7ad6a..195c519b368 100644 --- a/2020/14xxx/CVE-2020-14775.json +++ b/2020/14xxx/CVE-2020-14775.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14776.json b/2020/14xxx/CVE-2020-14776.json index de4954160a9..b7c737b5a03 100644 --- a/2020/14xxx/CVE-2020-14776.json +++ b/2020/14xxx/CVE-2020-14776.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14777.json b/2020/14xxx/CVE-2020-14777.json index 84d48aaed95..d71d49f074b 100644 --- a/2020/14xxx/CVE-2020-14777.json +++ b/2020/14xxx/CVE-2020-14777.json @@ -69,6 +69,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-4f9ee82bc5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" } ] } diff --git a/2020/14xxx/CVE-2020-14785.json b/2020/14xxx/CVE-2020-14785.json index dda20ce7e3f..38bf480e3a9 100644 --- a/2020/14xxx/CVE-2020-14785.json +++ b/2020/14xxx/CVE-2020-14785.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14786.json b/2020/14xxx/CVE-2020-14786.json index 1b976722c6a..315d2fc9d6b 100644 --- a/2020/14xxx/CVE-2020-14786.json +++ b/2020/14xxx/CVE-2020-14786.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14789.json b/2020/14xxx/CVE-2020-14789.json index 6da59365869..8a9b54957d7 100644 --- a/2020/14xxx/CVE-2020-14789.json +++ b/2020/14xxx/CVE-2020-14789.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14790.json b/2020/14xxx/CVE-2020-14790.json index 82b758922a5..2280f124e6d 100644 --- a/2020/14xxx/CVE-2020-14790.json +++ b/2020/14xxx/CVE-2020-14790.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14791.json b/2020/14xxx/CVE-2020-14791.json index 56b1a0a062a..ede6c2c8d0a 100644 --- a/2020/14xxx/CVE-2020-14791.json +++ b/2020/14xxx/CVE-2020-14791.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14793.json b/2020/14xxx/CVE-2020-14793.json index bc6fef8c648..c85e35dcc5c 100644 --- a/2020/14xxx/CVE-2020-14793.json +++ b/2020/14xxx/CVE-2020-14793.json @@ -77,6 +77,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/14xxx/CVE-2020-14794.json b/2020/14xxx/CVE-2020-14794.json index 13e11d4d5fa..6e96de1c691 100644 --- a/2020/14xxx/CVE-2020-14794.json +++ b/2020/14xxx/CVE-2020-14794.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201023-0003/", "url": "https://security.netapp.com/advisory/ntap-20201023-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eee64a579c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" } ] } diff --git a/2020/15xxx/CVE-2020-15238.json b/2020/15xxx/CVE-2020-15238.json index c2b570f0858..a1fce27070c 100644 --- a/2020/15xxx/CVE-2020-15238.json +++ b/2020/15xxx/CVE-2020-15238.json @@ -98,6 +98,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201103 [SECURITY] [DLA 2430-1] blueman security update", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00005.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-7c22b25a07", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFLMNHAHX5HPIKC5IG6F25HO5Z6RH2N/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-ebabb6bf76", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W52NP7HRFTNAVNZLGKY4GR3JIZG5KKGS/" } ] }, diff --git a/2020/15xxx/CVE-2020-15967.json b/2020/15xxx/CVE-2020-15967.json index caec83a3bc7..e63535e7b47 100644 --- a/2020/15xxx/CVE-2020-15967.json +++ b/2020/15xxx/CVE-2020-15967.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15968.json b/2020/15xxx/CVE-2020-15968.json index fbd3839e215..790ce183a55 100644 --- a/2020/15xxx/CVE-2020-15968.json +++ b/2020/15xxx/CVE-2020-15968.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15969.json b/2020/15xxx/CVE-2020-15969.json index f41cfbe7726..ea7a9f6cf06 100644 --- a/2020/15xxx/CVE-2020-15969.json +++ b/2020/15xxx/CVE-2020-15969.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15970.json b/2020/15xxx/CVE-2020-15970.json index e49d694d428..4eb7fcc647d 100644 --- a/2020/15xxx/CVE-2020-15970.json +++ b/2020/15xxx/CVE-2020-15970.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15971.json b/2020/15xxx/CVE-2020-15971.json index 3e3d0e1c86f..b26105676fd 100644 --- a/2020/15xxx/CVE-2020-15971.json +++ b/2020/15xxx/CVE-2020-15971.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15972.json b/2020/15xxx/CVE-2020-15972.json index 321a700c4d3..411f78f06a7 100644 --- a/2020/15xxx/CVE-2020-15972.json +++ b/2020/15xxx/CVE-2020-15972.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15973.json b/2020/15xxx/CVE-2020-15973.json index 1f13f33fb5c..897f3249bdd 100644 --- a/2020/15xxx/CVE-2020-15973.json +++ b/2020/15xxx/CVE-2020-15973.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15974.json b/2020/15xxx/CVE-2020-15974.json index 4eb39db1ba5..6ea621cb772 100644 --- a/2020/15xxx/CVE-2020-15974.json +++ b/2020/15xxx/CVE-2020-15974.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15975.json b/2020/15xxx/CVE-2020-15975.json index 5fa932e2eef..6706f1115a8 100644 --- a/2020/15xxx/CVE-2020-15975.json +++ b/2020/15xxx/CVE-2020-15975.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15976.json b/2020/15xxx/CVE-2020-15976.json index 2c8e4f44ffe..24187e25127 100644 --- a/2020/15xxx/CVE-2020-15976.json +++ b/2020/15xxx/CVE-2020-15976.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15977.json b/2020/15xxx/CVE-2020-15977.json index 7250b84845a..6361142f3ee 100644 --- a/2020/15xxx/CVE-2020-15977.json +++ b/2020/15xxx/CVE-2020-15977.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15978.json b/2020/15xxx/CVE-2020-15978.json index 50451f37ad4..eee37d1ad26 100644 --- a/2020/15xxx/CVE-2020-15978.json +++ b/2020/15xxx/CVE-2020-15978.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15979.json b/2020/15xxx/CVE-2020-15979.json index 7cc003998cb..79e69611880 100644 --- a/2020/15xxx/CVE-2020-15979.json +++ b/2020/15xxx/CVE-2020-15979.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15980.json b/2020/15xxx/CVE-2020-15980.json index 42fa4893ae0..00843ed174b 100644 --- a/2020/15xxx/CVE-2020-15980.json +++ b/2020/15xxx/CVE-2020-15980.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15981.json b/2020/15xxx/CVE-2020-15981.json index 0b1efdd0ea9..87ebe2508be 100644 --- a/2020/15xxx/CVE-2020-15981.json +++ b/2020/15xxx/CVE-2020-15981.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15982.json b/2020/15xxx/CVE-2020-15982.json index 81189783a79..74e4674f424 100644 --- a/2020/15xxx/CVE-2020-15982.json +++ b/2020/15xxx/CVE-2020-15982.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15983.json b/2020/15xxx/CVE-2020-15983.json index 39d79263be3..83d8899560f 100644 --- a/2020/15xxx/CVE-2020-15983.json +++ b/2020/15xxx/CVE-2020-15983.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15984.json b/2020/15xxx/CVE-2020-15984.json index 8ec7d227806..30a13513100 100644 --- a/2020/15xxx/CVE-2020-15984.json +++ b/2020/15xxx/CVE-2020-15984.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15985.json b/2020/15xxx/CVE-2020-15985.json index f1a2d870f2f..a8a660a5f6e 100644 --- a/2020/15xxx/CVE-2020-15985.json +++ b/2020/15xxx/CVE-2020-15985.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15986.json b/2020/15xxx/CVE-2020-15986.json index 77f1629694c..1d6c66e6b0f 100644 --- a/2020/15xxx/CVE-2020-15986.json +++ b/2020/15xxx/CVE-2020-15986.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15987.json b/2020/15xxx/CVE-2020-15987.json index a232f3aeb72..d7683e170ac 100644 --- a/2020/15xxx/CVE-2020-15987.json +++ b/2020/15xxx/CVE-2020-15987.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15988.json b/2020/15xxx/CVE-2020-15988.json index 5fa2565c0df..7c1afaaf982 100644 --- a/2020/15xxx/CVE-2020-15988.json +++ b/2020/15xxx/CVE-2020-15988.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15989.json b/2020/15xxx/CVE-2020-15989.json index 7ea2cd5c93a..82e8ea9f4fb 100644 --- a/2020/15xxx/CVE-2020-15989.json +++ b/2020/15xxx/CVE-2020-15989.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15990.json b/2020/15xxx/CVE-2020-15990.json index 537dce33f85..a3e751b3b57 100644 --- a/2020/15xxx/CVE-2020-15990.json +++ b/2020/15xxx/CVE-2020-15990.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15991.json b/2020/15xxx/CVE-2020-15991.json index bfa9c59c162..da9e20128ab 100644 --- a/2020/15xxx/CVE-2020-15991.json +++ b/2020/15xxx/CVE-2020-15991.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/15xxx/CVE-2020-15992.json b/2020/15xxx/CVE-2020-15992.json index 4965da938cf..67dee94628c 100644 --- a/2020/15xxx/CVE-2020-15992.json +++ b/2020/15xxx/CVE-2020-15992.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/16xxx/CVE-2020-16000.json b/2020/16xxx/CVE-2020-16000.json index f41c73922a5..42231cfa294 100644 --- a/2020/16xxx/CVE-2020-16000.json +++ b/2020/16xxx/CVE-2020-16000.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/16xxx/CVE-2020-16001.json b/2020/16xxx/CVE-2020-16001.json index aa6570b3412..c3a5d008cbf 100644 --- a/2020/16xxx/CVE-2020-16001.json +++ b/2020/16xxx/CVE-2020-16001.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/16xxx/CVE-2020-16002.json b/2020/16xxx/CVE-2020-16002.json index e797727e789..5464976c5a9 100644 --- a/2020/16xxx/CVE-2020-16002.json +++ b/2020/16xxx/CVE-2020-16002.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/16xxx/CVE-2020-16003.json b/2020/16xxx/CVE-2020-16003.json index 8123a2574dc..fa666927431 100644 --- a/2020/16xxx/CVE-2020-16003.json +++ b/2020/16xxx/CVE-2020-16003.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] }, diff --git a/2020/17xxx/CVE-2020-17510.json b/2020/17xxx/CVE-2020-17510.json index a79586efcd6..48d9d51a1e1 100644 --- a/2020/17xxx/CVE-2020-17510.json +++ b/2020/17xxx/CVE-2020-17510.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E", "url": "https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20201105 [CVE-2020-17510] Apache Shiro 1.7.0 released", + "url": "https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27347.json b/2020/27xxx/CVE-2020-27347.json index e4bd6881cfe..a06cf8281cb 100644 --- a/2020/27xxx/CVE-2020-27347.json +++ b/2020/27xxx/CVE-2020-27347.json @@ -105,12 +105,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c" + "refsource": "MISC", + "url": "https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c", + "name": "https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c" }, { - "refsource": "CONFIRM", - "url": "https://www.openwall.com/lists/oss-security/2020/11/05/3" + "refsource": "MISC", + "url": "https://www.openwall.com/lists/oss-security/2020/11/05/3", + "name": "https://www.openwall.com/lists/oss-security/2020/11/05/3" } ] }, @@ -118,4 +120,4 @@ "advisory": "https://usn.ubuntu.com/usn/usn-4618-1", "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5643.json b/2020/5xxx/CVE-2020-5643.json index 21dccd0bb3c..3061e33fa68 100644 --- a/2020/5xxx/CVE-2020-5643.json +++ b/2020/5xxx/CVE-2020-5643.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5643", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36725/" + "url": "https://kb.cybozu.support/article/36725/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36725/" }, { - "url": "https://jvn.jp/en/jp/JVN57942454/index.html" + "url": "https://jvn.jp/en/jp/JVN57942454/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN57942454/index.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5644.json b/2020/5xxx/CVE-2020-5644.json index 897af10012c..6472ac62a80 100644 --- a/2020/5xxx/CVE-2020-5644.json +++ b/2020/5xxx/CVE-2020-5644.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5644", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "(GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier)" + "version_value": "(GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier)" } ] } @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02", + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" }, { - "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" + "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" }, { - "url": "https://jvn.jp/vu/JVNVU99562395/index.html" + "url": "https://jvn.jp/vu/JVNVU99562395/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99562395/index.html" } ] }, @@ -61,7 +70,7 @@ "description_data": [ { "lang": "eng", - "value": "Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet." + "value": "Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet." } ] } diff --git a/2020/5xxx/CVE-2020-5645.json b/2020/5xxx/CVE-2020-5645.json index be064f66bd7..cbc642ed5a0 100644 --- a/2020/5xxx/CVE-2020-5645.json +++ b/2020/5xxx/CVE-2020-5645.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5645", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "(GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier)" + "version_value": "(GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier)" } ] } @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02", + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" }, { - "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" + "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" }, { - "url": "https://jvn.jp/vu/JVNVU99562395/index.html" + "url": "https://jvn.jp/vu/JVNVU99562395/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99562395/index.html" } ] }, @@ -61,7 +70,7 @@ "description_data": [ { "lang": "eng", - "value": "Session fixation vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet." + "value": "Session fixation vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet." } ] } diff --git a/2020/5xxx/CVE-2020-5646.json b/2020/5xxx/CVE-2020-5646.json index 13e8fe9179e..895bc2ae6c5 100644 --- a/2020/5xxx/CVE-2020-5646.json +++ b/2020/5xxx/CVE-2020-5646.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5646", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "(GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier)" + "version_value": "(GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier)" } ] } @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02", + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" }, { - "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" + "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" }, { - "url": "https://jvn.jp/vu/JVNVU99562395/index.html" + "url": "https://jvn.jp/vu/JVNVU99562395/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99562395/index.html" } ] }, @@ -61,7 +70,7 @@ "description_data": [ { "lang": "eng", - "value": "NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet." + "value": "NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet." } ] } diff --git a/2020/5xxx/CVE-2020-5647.json b/2020/5xxx/CVE-2020-5647.json index 3e43d767897..4dbf1020a52 100644 --- a/2020/5xxx/CVE-2020-5647.json +++ b/2020/5xxx/CVE-2020-5647.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5647", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "(GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier)" + "version_value": "(GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier)" } ] } @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02", + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" }, { - "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" + "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" }, { - "url": "https://jvn.jp/vu/JVNVU99562395/index.html" + "url": "https://jvn.jp/vu/JVNVU99562395/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99562395/index.html" } ] }, @@ -61,7 +70,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper access control vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet." + "value": "Improper access control vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet." } ] } diff --git a/2020/5xxx/CVE-2020-5648.json b/2020/5xxx/CVE-2020-5648.json index ecfc3950e4e..5908d8e00ce 100644 --- a/2020/5xxx/CVE-2020-5648.json +++ b/2020/5xxx/CVE-2020-5648.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5648", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "(GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier)" + "version_value": "(GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier)" } ] } @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02", + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" }, { - "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" + "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" }, { - "url": "https://jvn.jp/vu/JVNVU99562395/index.html" + "url": "https://jvn.jp/vu/JVNVU99562395/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99562395/index.html" } ] }, @@ -61,7 +70,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet." + "value": "Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet." } ] } diff --git a/2020/5xxx/CVE-2020-5649.json b/2020/5xxx/CVE-2020-5649.json index 0e39e6e078b..40dab559da5 100644 --- a/2020/5xxx/CVE-2020-5649.json +++ b/2020/5xxx/CVE-2020-5649.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5649", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "(GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier)" + "version_value": "(GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier)" } ] } @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02", + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02" }, { - "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf" }, { - "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" + "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf" }, { - "url": "https://jvn.jp/vu/JVNVU99562395/index.html" + "url": "https://jvn.jp/vu/JVNVU99562395/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99562395/index.html" } ] }, @@ -61,7 +70,7 @@ "description_data": [ { "lang": "eng", - "value": "Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet." + "value": "Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1450-QLBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, GT1455HS-QTBDE CoreOS version \u201905.65.00.BD\u2019 and earlier, and GT1450HS-QMBDE CoreOS version \u201905.65.00.BD\u2019 and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet." } ] } diff --git a/2020/5xxx/CVE-2020-5667.json b/2020/5xxx/CVE-2020-5667.json index 85181f14e4f..d70ab2e0ec8 100644 --- a/2020/5xxx/CVE-2020-5667.json +++ b/2020/5xxx/CVE-2020-5667.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5667", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN00414047/index.html" + "url": "https://jvn.jp/en/jp/JVN00414047/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN00414047/index.html" } ] }, @@ -52,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app." + "value": "Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app." } ] } diff --git a/2020/6xxx/CVE-2020-6557.json b/2020/6xxx/CVE-2020-6557.json index 7f03eb304f4..85fd54b668f 100644 --- a/2020/6xxx/CVE-2020-6557.json +++ b/2020/6xxx/CVE-2020-6557.json @@ -59,6 +59,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1829", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-127d40f1ab", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" } ] },