diff --git a/2018/6xxx/CVE-2018-6880.json b/2018/6xxx/CVE-2018-6880.json index 388cefe6ee1..a662c4a671e 100644 --- a/2018/6xxx/CVE-2018-6880.json +++ b/2018/6xxx/CVE-2018-6880.json @@ -56,6 +56,11 @@ "name": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md", "refsource": "MISC", "url": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md" + }, + { + "refsource": "MISC", + "name": "https://kongxin.gitbook.io/empirecms/", + "url": "https://kongxin.gitbook.io/empirecms/" } ] } diff --git a/2018/6xxx/CVE-2018-6881.json b/2018/6xxx/CVE-2018-6881.json index 295b53d6fdd..aeb25e9fd20 100644 --- a/2018/6xxx/CVE-2018-6881.json +++ b/2018/6xxx/CVE-2018-6881.json @@ -56,6 +56,16 @@ "name": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md", "refsource": "MISC", "url": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md" + }, + { + "refsource": "MISC", + "name": "https://kongxin.gitbook.io/empirecms/", + "url": "https://kongxin.gitbook.io/empirecms/" + }, + { + "refsource": "MISC", + "name": "https://kongxin.gitbook.io/dedecms-5-7-bug/", + "url": "https://kongxin.gitbook.io/dedecms-5-7-bug/" } ] } diff --git a/2018/6xxx/CVE-2018-6910.json b/2018/6xxx/CVE-2018-6910.json index 7c927ef127b..f79efdcb88b 100644 --- a/2018/6xxx/CVE-2018-6910.json +++ b/2018/6xxx/CVE-2018-6910.json @@ -56,6 +56,11 @@ "name": "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md", "refsource": "MISC", "url": "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md" + }, + { + "refsource": "MISC", + "name": "https://kongxin.gitbook.io/dedecms-5-7-bug/", + "url": "https://kongxin.gitbook.io/dedecms-5-7-bug/" } ] } diff --git a/2018/7xxx/CVE-2018-7434.json b/2018/7xxx/CVE-2018-7434.json index bafa61e0721..8c4da8fa52e 100644 --- a/2018/7xxx/CVE-2018-7434.json +++ b/2018/7xxx/CVE-2018-7434.json @@ -56,6 +56,11 @@ "name": "https://github.com/kongxin520/zzcms/blob/master/zzcms_8.2_bug.md", "refsource": "MISC", "url": "https://github.com/kongxin520/zzcms/blob/master/zzcms_8.2_bug.md" + }, + { + "refsource": "MISC", + "name": "https://kongxin.gitbook.io/zzcms-8-2-bug/", + "url": "https://kongxin.gitbook.io/zzcms-8-2-bug/" } ] } diff --git a/2018/7xxx/CVE-2018-7479.json b/2018/7xxx/CVE-2018-7479.json index e13a7c2b72f..74fec6a9341 100644 --- a/2018/7xxx/CVE-2018-7479.json +++ b/2018/7xxx/CVE-2018-7479.json @@ -56,6 +56,11 @@ "name": "https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md", "refsource": "MISC", "url": "https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md" + }, + { + "refsource": "MISC", + "name": "https://kongxin.gitbook.io/yzmcms-3-6-bug/", + "url": "https://kongxin.gitbook.io/yzmcms-3-6-bug/" } ] } diff --git a/2021/35xxx/CVE-2021-35500.json b/2021/35xxx/CVE-2021-35500.json index b570d09c37d..509667f8ec1 100644 --- a/2021/35xxx/CVE-2021-35500.json +++ b/2021/35xxx/CVE-2021-35500.json @@ -108,6 +108,11 @@ "name": "https://www.tibco.com/services/support/advisories", "refsource": "CONFIRM", "url": "https://www.tibco.com/services/support/advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-12-2022-tibco-data-virtualization-2021-35500", + "url": "https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-12-2022-tibco-data-virtualization-2021-35500" } ] }, diff --git a/2021/41xxx/CVE-2021-41597.json b/2021/41xxx/CVE-2021-41597.json index c23190ff6df..72be3136ee0 100644 --- a/2021/41xxx/CVE-2021-41597.json +++ b/2021/41xxx/CVE-2021-41597.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41597", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41597", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SuiteCRM through 7.11.21 is vulnerable to CSRF, with resultant remote code execution, via the UpgradeWizard functionality, if a PHP file is included in a ZIP archive." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://suitecrm.com", + "refsource": "MISC", + "name": "https://suitecrm.com" + }, + { + "url": "https://github.com/salesagility/SuiteCRM", + "refsource": "MISC", + "name": "https://github.com/salesagility/SuiteCRM" + }, + { + "refsource": "MISC", + "name": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_35", + "url": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_35" + }, + { + "refsource": "MISC", + "name": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41597.md", + "url": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41597.md" + }, + { + "refsource": "MISC", + "name": "https://docs.suitecrm.com/admin/releases/", + "url": "https://docs.suitecrm.com/admin/releases/" } ] } diff --git a/2021/42xxx/CVE-2021-42558.json b/2021/42xxx/CVE-2021-42558.json index 3a413bfb480..bc16c6cf8aa 100644 --- a/2021/42xxx/CVE-2021-42558.json +++ b/2021/42xxx/CVE-2021-42558.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-42558", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-42558", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/mitre/caldera/releases", + "refsource": "MISC", + "name": "https://github.com/mitre/caldera/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera", + "url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera" } ] } diff --git a/2021/42xxx/CVE-2021-42559.json b/2021/42xxx/CVE-2021-42559.json index fcf63076aca..bab627d6413 100644 --- a/2021/42xxx/CVE-2021-42559.json +++ b/2021/42xxx/CVE-2021-42559.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-42559", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-42559", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in CALDERA 2.8.1. It contains multiple startup \"requirements\" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/mitre/caldera/releases", + "refsource": "MISC", + "name": "https://github.com/mitre/caldera/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera", + "url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera" } ] } diff --git a/2021/44xxx/CVE-2021-44224.json b/2021/44xxx/CVE-2021-44224.json index 9412d636ee9..e6a0ee2b0bb 100644 --- a/2021/44xxx/CVE-2021-44224.json +++ b/2021/44xxx/CVE-2021-44224.json @@ -107,6 +107,11 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2022-01", "url": "https://www.tenable.com/security/tns-2022-01" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2022-03", + "url": "https://www.tenable.com/security/tns-2022-03" } ] }, diff --git a/2021/44xxx/CVE-2021-44790.json b/2021/44xxx/CVE-2021-44790.json index 8f03dd2fc71..4f0eac0590b 100644 --- a/2021/44xxx/CVE-2021-44790.json +++ b/2021/44xxx/CVE-2021-44790.json @@ -102,6 +102,11 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2022-01", "url": "https://www.tenable.com/security/tns-2022-01" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2022-03", + "url": "https://www.tenable.com/security/tns-2022-03" } ] }, diff --git a/2021/45xxx/CVE-2021-45449.json b/2021/45xxx/CVE-2021-45449.json index a582a2f7ce5..9f7e0a60cbb 100644 --- a/2021/45xxx/CVE-2021-45449.json +++ b/2021/45xxx/CVE-2021-45449.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-45449", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-45449", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining access to this data would require having access to the user\u2019s local files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.docker.com/desktop/windows/release-notes/", + "refsource": "MISC", + "name": "https://docs.docker.com/desktop/windows/release-notes/" } ] } diff --git a/2022/20xxx/CVE-2022-20612.json b/2022/20xxx/CVE-2022-20612.json index e148102a732..307bfb6f42d 100644 --- a/2022/20xxx/CVE-2022-20612.json +++ b/2022/20xxx/CVE-2022-20612.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20612", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20613.json b/2022/20xxx/CVE-2022-20613.json index 7a449b15ba4..71618f84b9f 100644 --- a/2022/20xxx/CVE-2022-20613.json +++ b/2022/20xxx/CVE-2022-20613.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20613", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20614.json b/2022/20xxx/CVE-2022-20614.json index f5da7d4aa53..14d9226296a 100644 --- a/2022/20xxx/CVE-2022-20614.json +++ b/2022/20xxx/CVE-2022-20614.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20614", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20615.json b/2022/20xxx/CVE-2022-20615.json index 056cc0a2b47..9b00f574b4a 100644 --- a/2022/20xxx/CVE-2022-20615.json +++ b/2022/20xxx/CVE-2022-20615.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20615", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20616.json b/2022/20xxx/CVE-2022-20616.json index bc63541cc92..5d61fa83840 100644 --- a/2022/20xxx/CVE-2022-20616.json +++ b/2022/20xxx/CVE-2022-20616.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20616", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20617.json b/2022/20xxx/CVE-2022-20617.json index b1ea4aa7a81..dcffc747001 100644 --- a/2022/20xxx/CVE-2022-20617.json +++ b/2022/20xxx/CVE-2022-20617.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20617", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20618.json b/2022/20xxx/CVE-2022-20618.json index ad00d9f05a5..6136a2dafcb 100644 --- a/2022/20xxx/CVE-2022-20618.json +++ b/2022/20xxx/CVE-2022-20618.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20618", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20619.json b/2022/20xxx/CVE-2022-20619.json index 750b3ea409f..c783e25d139 100644 --- a/2022/20xxx/CVE-2022-20619.json +++ b/2022/20xxx/CVE-2022-20619.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20619", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20620.json b/2022/20xxx/CVE-2022-20620.json index f8916c5aa42..8b90b6c266c 100644 --- a/2022/20xxx/CVE-2022-20620.json +++ b/2022/20xxx/CVE-2022-20620.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20620", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/20xxx/CVE-2022-20621.json b/2022/20xxx/CVE-2022-20621.json index 549ee4adb66..4e5cc871b6c 100644 --- a/2022/20xxx/CVE-2022-20621.json +++ b/2022/20xxx/CVE-2022-20621.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-20621", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23105.json b/2022/23xxx/CVE-2022-23105.json index 544a0cb978c..3705c724076 100644 --- a/2022/23xxx/CVE-2022-23105.json +++ b/2022/23xxx/CVE-2022-23105.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23105", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23106.json b/2022/23xxx/CVE-2022-23106.json index 0a017bf3dca..0592f77bd58 100644 --- a/2022/23xxx/CVE-2022-23106.json +++ b/2022/23xxx/CVE-2022-23106.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23106", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23107.json b/2022/23xxx/CVE-2022-23107.json index 4b0105f6d42..8bdc9f13835 100644 --- a/2022/23xxx/CVE-2022-23107.json +++ b/2022/23xxx/CVE-2022-23107.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23107", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23108.json b/2022/23xxx/CVE-2022-23108.json index c9e02e9ad98..cee88da1bb5 100644 --- a/2022/23xxx/CVE-2022-23108.json +++ b/2022/23xxx/CVE-2022-23108.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23108", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23109.json b/2022/23xxx/CVE-2022-23109.json index fdfb77ae254..a6ccc325d98 100644 --- a/2022/23xxx/CVE-2022-23109.json +++ b/2022/23xxx/CVE-2022-23109.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23109", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23110.json b/2022/23xxx/CVE-2022-23110.json index 8ec5d2235a4..8ea3650699d 100644 --- a/2022/23xxx/CVE-2022-23110.json +++ b/2022/23xxx/CVE-2022-23110.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23110", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23111.json b/2022/23xxx/CVE-2022-23111.json index 9d80feebef7..8ab86f9da68 100644 --- a/2022/23xxx/CVE-2022-23111.json +++ b/2022/23xxx/CVE-2022-23111.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23111", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23112.json b/2022/23xxx/CVE-2022-23112.json index c2cc13edd79..3e99ff2d0e9 100644 --- a/2022/23xxx/CVE-2022-23112.json +++ b/2022/23xxx/CVE-2022-23112.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23112", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23113.json b/2022/23xxx/CVE-2022-23113.json index a7c19ebcade..e80470eb36b 100644 --- a/2022/23xxx/CVE-2022-23113.json +++ b/2022/23xxx/CVE-2022-23113.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23113", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23114.json b/2022/23xxx/CVE-2022-23114.json index 90356e1e770..a26d3382591 100644 --- a/2022/23xxx/CVE-2022-23114.json +++ b/2022/23xxx/CVE-2022-23114.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23114", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23115.json b/2022/23xxx/CVE-2022-23115.json index 7d0d65ab73c..27ed6a89f2e 100644 --- a/2022/23xxx/CVE-2022-23115.json +++ b/2022/23xxx/CVE-2022-23115.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23115", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23116.json b/2022/23xxx/CVE-2022-23116.json index 3f2afe114e9..e62efd72c34 100644 --- a/2022/23xxx/CVE-2022-23116.json +++ b/2022/23xxx/CVE-2022-23116.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23116", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23117.json b/2022/23xxx/CVE-2022-23117.json index 151b7dc9cdc..3cc2b68bedb 100644 --- a/2022/23xxx/CVE-2022-23117.json +++ b/2022/23xxx/CVE-2022-23117.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23117", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/23xxx/CVE-2022-23118.json b/2022/23xxx/CVE-2022-23118.json index 4001c80ec6b..efd0f9f7882 100644 --- a/2022/23xxx/CVE-2022-23118.json +++ b/2022/23xxx/CVE-2022-23118.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-23118", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": {