diff --git a/2018/8xxx/CVE-2018-8956.json b/2018/8xxx/CVE-2018-8956.json index 296eb413223..d79b3fbdf2b 100644 --- a/2018/8xxx/CVE-2018-8956.json +++ b/2018/8xxx/CVE-2018-8956.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://arxiv.org/abs/2005.01783", "url": "https://arxiv.org/abs/2005.01783" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0006/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0006/" } ] } diff --git a/2019/15xxx/CVE-2019-15878.json b/2019/15xxx/CVE-2019-15878.json index daf19f96b5a..4ec71b5b661 100644 --- a/2019/15xxx/CVE-2019-15878.json +++ b/2019/15xxx/CVE-2019-15878.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:14.sctp.asc", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:14.sctp.asc" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0007/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0007/" } ] }, diff --git a/2019/15xxx/CVE-2019-15879.json b/2019/15xxx/CVE-2019-15879.json index e00ad3b7f45..b38205b7676 100644 --- a/2019/15xxx/CVE-2019-15879.json +++ b/2019/15xxx/CVE-2019-15879.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:15.cryptodev.asc", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:15.cryptodev.asc" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0005/" } ] }, diff --git a/2019/15xxx/CVE-2019-15880.json b/2019/15xxx/CVE-2019-15880.json index 3fe0566d834..db2665075fe 100644 --- a/2019/15xxx/CVE-2019-15880.json +++ b/2019/15xxx/CVE-2019-15880.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0008/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0008/" } ] }, diff --git a/2019/18xxx/CVE-2019-18823.json b/2019/18xxx/CVE-2019-18823.json index a8299aa4804..d351d52c710 100644 --- a/2019/18xxx/CVE-2019-18823.json +++ b/2019/18xxx/CVE-2019-18823.json @@ -91,6 +91,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-f9a598f815", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BL5YCZXYS67MLJSHR4OLSWVHBE6PZJSB/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-fb5af97476", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMPZ7XPOPA4JGAQAUJ4K7JV653DSCIDK/" } ] } diff --git a/2020/10xxx/CVE-2020-10683.json b/2020/10xxx/CVE-2020-10683.json index 78f3a3b7add..ddecaac08c8 100644 --- a/2020/10xxx/CVE-2020-10683.json +++ b/2020/10xxx/CVE-2020-10683.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658", "url": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0002/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0002/" } ] } diff --git a/2020/12xxx/CVE-2020-12430.json b/2020/12xxx/CVE-2020-12430.json index 08f34568691..8635e434ca6 100644 --- a/2020/12xxx/CVE-2020-12430.json +++ b/2020/12xxx/CVE-2020-12430.json @@ -66,6 +66,11 @@ "url": "https://libvirt.org/git/?p=libvirt.git;a=commit;h=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581", "refsource": "MISC", "name": "https://libvirt.org/git/?p=libvirt.git;a=commit;h=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0003/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0003/" } ] } diff --git a/2020/12xxx/CVE-2020-12458.json b/2020/12xxx/CVE-2020-12458.json index cbe079ac02a..cdec1bb3fb3 100644 --- a/2020/12xxx/CVE-2020-12458.json +++ b/2020/12xxx/CVE-2020-12458.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-c6b0c7ebbb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0001/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0001/" } ] } diff --git a/2020/12xxx/CVE-2020-12459.json b/2020/12xxx/CVE-2020-12459.json index 1e311c7f2f5..03485979cc6 100644 --- a/2020/12xxx/CVE-2020-12459.json +++ b/2020/12xxx/CVE-2020-12459.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-c6b0c7ebbb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0004/" } ] } diff --git a/2020/12xxx/CVE-2020-12857.json b/2020/12xxx/CVE-2020-12857.json index 6ef61e94b29..7bdb9e08ea9 100644 --- a/2020/12xxx/CVE-2020-12857.json +++ b/2020/12xxx/CVE-2020-12857.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12857", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12857", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Caching of GATT characteristic values (TempID) in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to long-term re-identify an Android device running COVIDSafe." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app", + "refsource": "MISC", + "name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app" + }, + { + "url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing" + }, + { + "refsource": "MISC", + "name": "https://covidsafe.watch/issue-register/cve-2020-12857-tempid-identifier-was-static", + "url": "https://covidsafe.watch/issue-register/cve-2020-12857-tempid-identifier-was-static" } ] } diff --git a/2020/12xxx/CVE-2020-12858.json b/2020/12xxx/CVE-2020-12858.json index b59bbacc77f..fb659c36836 100644 --- a/2020/12xxx/CVE-2020-12858.json +++ b/2020/12xxx/CVE-2020-12858.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12858", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12858", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to re-identify Android devices running COVIDSafe by scanning for their advertising beacons." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app", + "refsource": "MISC", + "name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app" + }, + { + "url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing" } ] } diff --git a/2020/12xxx/CVE-2020-12859.json b/2020/12xxx/CVE-2020-12859.json index 01d621e80e3..48319381c93 100644 --- a/2020/12xxx/CVE-2020-12859.json +++ b/2020/12xxx/CVE-2020-12859.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12859", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12859", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote attacker to identify a device model by observing cleartext payload data. This allows re-identification of devices, especially less common phone models or those in low-density situations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app", + "refsource": "MISC", + "name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app" + }, + { + "url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing" } ] } diff --git a/2020/12xxx/CVE-2020-12860.json b/2020/12xxx/CVE-2020-12860.json index 7163cfb0f96..cbfe908a069 100644 --- a/2020/12xxx/CVE-2020-12860.json +++ b/2020/12xxx/CVE-2020-12860.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12860", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12860", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "COVIDSafe through v1.0.17 allows a remote attacker to access phone name and model information because a BLE device can have four roles and COVIDSafe uses all of them. This allows for re-identification of a device, and potentially identification of the owner's name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app", + "refsource": "MISC", + "name": "https://www.health.gov.au/resources/apps-and-tools/covidsafe-app" + }, + { + "url": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing" } ] } diff --git a/2020/13xxx/CVE-2020-13129.json b/2020/13xxx/CVE-2020-13129.json index 16907dee885..7e1bbd14c4e 100644 --- a/2020/13xxx/CVE-2020-13129.json +++ b/2020/13xxx/CVE-2020-13129.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13129", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13129", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the stashcat app through 3.9.1 for macOS. The GET method is used with client_key and device_id data in the query string, which allows attackers to obtain sensitive information by reading web-server logs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.jvanlaak.de/stashcat.html", + "refsource": "MISC", + "name": "https://www.jvanlaak.de/stashcat.html" + }, + { + "url": "https://www.jvanlaak.de/stashcat_CWE_598_205017.pdf", + "refsource": "MISC", + "name": "https://www.jvanlaak.de/stashcat_CWE_598_205017.pdf" } ] } diff --git a/2020/2xxx/CVE-2020-2754.json b/2020/2xxx/CVE-2020-2754.json index e781dba6cb5..968ba854a28 100644 --- a/2020/2xxx/CVE-2020-2754.json +++ b/2020/2xxx/CVE-2020-2754.json @@ -98,6 +98,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2755.json b/2020/2xxx/CVE-2020-2755.json index 765bb62675a..6c42a8fdb5e 100644 --- a/2020/2xxx/CVE-2020-2755.json +++ b/2020/2xxx/CVE-2020-2755.json @@ -98,6 +98,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2756.json b/2020/2xxx/CVE-2020-2756.json index 01a97c0a61f..ceacec80187 100644 --- a/2020/2xxx/CVE-2020-2756.json +++ b/2020/2xxx/CVE-2020-2756.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2757.json b/2020/2xxx/CVE-2020-2757.json index 686d71a457c..8ad9dcf3da6 100644 --- a/2020/2xxx/CVE-2020-2757.json +++ b/2020/2xxx/CVE-2020-2757.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2773.json b/2020/2xxx/CVE-2020-2773.json index 73d04cfd4dd..ebd5473512b 100644 --- a/2020/2xxx/CVE-2020-2773.json +++ b/2020/2xxx/CVE-2020-2773.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2781.json b/2020/2xxx/CVE-2020-2781.json index ce5103de263..f2ea37c2e3a 100644 --- a/2020/2xxx/CVE-2020-2781.json +++ b/2020/2xxx/CVE-2020-2781.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2800.json b/2020/2xxx/CVE-2020-2800.json index 976554f2025..ffd3d93845a 100644 --- a/2020/2xxx/CVE-2020-2800.json +++ b/2020/2xxx/CVE-2020-2800.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2803.json b/2020/2xxx/CVE-2020-2803.json index 53327d0e7f6..5a56260feda 100644 --- a/2020/2xxx/CVE-2020-2803.json +++ b/2020/2xxx/CVE-2020-2803.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2805.json b/2020/2xxx/CVE-2020-2805.json index f81d3aed435..a190d19d9e3 100644 --- a/2020/2xxx/CVE-2020-2805.json +++ b/2020/2xxx/CVE-2020-2805.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/2xxx/CVE-2020-2830.json b/2020/2xxx/CVE-2020-2830.json index c3ddd3cd96b..f9403ef83d5 100644 --- a/2020/2xxx/CVE-2020-2830.json +++ b/2020/2xxx/CVE-2020-2830.json @@ -98,6 +98,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-21ca991b3b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-a60ad9d4ec", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/" } ] } diff --git a/2020/7xxx/CVE-2020-7454.json b/2020/7xxx/CVE-2020-7454.json index 5690e317d9d..03cf434b2e2 100644 --- a/2020/7xxx/CVE-2020-7454.json +++ b/2020/7xxx/CVE-2020-7454.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:12.libalias.asc", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:12.libalias.asc" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0005/" } ] }, diff --git a/2020/7xxx/CVE-2020-7455.json b/2020/7xxx/CVE-2020-7455.json index 81f49e93268..2df363d6695 100644 --- a/2020/7xxx/CVE-2020-7455.json +++ b/2020/7xxx/CVE-2020-7455.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:13.libalias.asc", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:13.libalias.asc" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200518-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200518-0005/" } ] },