correcting STATE field.

This commit is contained in:
Anthony Singleton 2022-08-04 13:45:00 -04:00
parent 42934d09a1
commit 6575ce5f50
21 changed files with 21 additions and 21 deletions

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-30535",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "NGINX Ingress Controller vulnerability CVE-2022-30535"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-31473",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP APM Appliance mode vulnerability CVE-2022-31473"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-32455",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "TMM vulnerability CVE-2022-32455"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-33203",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP APM and F5 SSL Orchestrator vulnerability CVE-2022-33203"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-33947",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP DNS TMUI Vulnerability CVE-2022-33947"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-33962",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP iRule vulnerability CVE-2022-33962"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-33968",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP LTM and APM NTLM vulnerability CVE-2022-33968"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-34651",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP TLS 1.3 iRule vulnerability CVE-2022-34651"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-34655",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "TMM vulnerability CVE-2022-34655"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-34844",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP and BIG-IQ AWS vulnerability CVE-2022-34844"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-34851",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP and BIG-IQ iControl SOAP vulnerability CVE-2022-34851"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-34862",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "TMM vulnerability CVE-2022-34862"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-34865",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "Traffic intelligence feeds vulnerability CVE-2022-34865"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35236",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "HTTP2 profile vulnerability CVE-2022-35236"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35240",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP Message Routing MQTT vulnerability CVE-2022-35240"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35241",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "NGINX Instance Manager vulnerability CVE-2022-35241"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35243",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "Authenticated iControl REST in Appliance mode vulnerability CVE-2022-35243"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35245",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP APM access policy vulnerability CVE-2022-35245"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35272",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP HTTP MRF vulnerability CVE-2022-35272"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35728",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "iControl REST vulnerability CVE-2022-35728"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-08-03T14:00:00.000Z",
"ID": "CVE-2022-35735",
"STATE": "DRAFT",
"STATE": "PUBLIC",
"TITLE": "BIG-IP monitor configuration vulnerability CVE-2022-35735"
},
"affects": {