From 6575ce5f502e9afd5b13bd7fd31e755bc98918b1 Mon Sep 17 00:00:00 2001 From: Anthony Singleton Date: Thu, 4 Aug 2022 13:45:00 -0400 Subject: [PATCH] correcting STATE field. --- 2022/30xxx/CVE-2022-30535.json | 2 +- 2022/31xxx/CVE-2022-31473.json | 2 +- 2022/32xxx/CVE-2022-32455.json | 2 +- 2022/33xxx/CVE-2022-33203.json | 2 +- 2022/33xxx/CVE-2022-33947.json | 2 +- 2022/33xxx/CVE-2022-33962.json | 2 +- 2022/33xxx/CVE-2022-33968.json | 2 +- 2022/34xxx/CVE-2022-34651.json | 2 +- 2022/34xxx/CVE-2022-34655.json | 2 +- 2022/34xxx/CVE-2022-34844.json | 2 +- 2022/34xxx/CVE-2022-34851.json | 2 +- 2022/34xxx/CVE-2022-34862.json | 2 +- 2022/34xxx/CVE-2022-34865.json | 2 +- 2022/35xxx/CVE-2022-35236.json | 2 +- 2022/35xxx/CVE-2022-35240.json | 2 +- 2022/35xxx/CVE-2022-35241.json | 2 +- 2022/35xxx/CVE-2022-35243.json | 2 +- 2022/35xxx/CVE-2022-35245.json | 2 +- 2022/35xxx/CVE-2022-35272.json | 2 +- 2022/35xxx/CVE-2022-35728.json | 2 +- 2022/35xxx/CVE-2022-35735.json | 2 +- 21 files changed, 21 insertions(+), 21 deletions(-) diff --git a/2022/30xxx/CVE-2022-30535.json b/2022/30xxx/CVE-2022-30535.json index 3b4c3060fef..85d6d1c5726 100644 --- a/2022/30xxx/CVE-2022-30535.json +++ b/2022/30xxx/CVE-2022-30535.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-30535", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "NGINX Ingress Controller vulnerability CVE-2022-30535" }, "affects": { diff --git a/2022/31xxx/CVE-2022-31473.json b/2022/31xxx/CVE-2022-31473.json index 9b763c930e5..2d3d8cbda3d 100644 --- a/2022/31xxx/CVE-2022-31473.json +++ b/2022/31xxx/CVE-2022-31473.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-31473", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP APM Appliance mode vulnerability CVE-2022-31473" }, "affects": { diff --git a/2022/32xxx/CVE-2022-32455.json b/2022/32xxx/CVE-2022-32455.json index 12c5801a8da..e3dc5fa3f92 100644 --- a/2022/32xxx/CVE-2022-32455.json +++ b/2022/32xxx/CVE-2022-32455.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-32455", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "TMM vulnerability CVE-2022-32455" }, "affects": { diff --git a/2022/33xxx/CVE-2022-33203.json b/2022/33xxx/CVE-2022-33203.json index e1a67e476f4..072319165d0 100644 --- a/2022/33xxx/CVE-2022-33203.json +++ b/2022/33xxx/CVE-2022-33203.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-33203", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP APM and F5 SSL Orchestrator vulnerability CVE-2022-33203" }, "affects": { diff --git a/2022/33xxx/CVE-2022-33947.json b/2022/33xxx/CVE-2022-33947.json index 92484c44543..96f15418c01 100644 --- a/2022/33xxx/CVE-2022-33947.json +++ b/2022/33xxx/CVE-2022-33947.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-33947", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP DNS TMUI Vulnerability CVE-2022-33947" }, "affects": { diff --git a/2022/33xxx/CVE-2022-33962.json b/2022/33xxx/CVE-2022-33962.json index c1db95863f2..c79fda5257d 100644 --- a/2022/33xxx/CVE-2022-33962.json +++ b/2022/33xxx/CVE-2022-33962.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-33962", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP iRule vulnerability CVE-2022-33962" }, "affects": { diff --git a/2022/33xxx/CVE-2022-33968.json b/2022/33xxx/CVE-2022-33968.json index 6bb0ac7c2e5..a65413de440 100644 --- a/2022/33xxx/CVE-2022-33968.json +++ b/2022/33xxx/CVE-2022-33968.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-33968", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP LTM and APM NTLM vulnerability CVE-2022-33968" }, "affects": { diff --git a/2022/34xxx/CVE-2022-34651.json b/2022/34xxx/CVE-2022-34651.json index 106abd6f92d..b886c5a9186 100644 --- a/2022/34xxx/CVE-2022-34651.json +++ b/2022/34xxx/CVE-2022-34651.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-34651", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP TLS 1.3 iRule vulnerability CVE-2022-34651" }, "affects": { diff --git a/2022/34xxx/CVE-2022-34655.json b/2022/34xxx/CVE-2022-34655.json index bbc528b5eaf..6ad7206a09d 100644 --- a/2022/34xxx/CVE-2022-34655.json +++ b/2022/34xxx/CVE-2022-34655.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-34655", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "TMM vulnerability CVE-2022-34655" }, "affects": { diff --git a/2022/34xxx/CVE-2022-34844.json b/2022/34xxx/CVE-2022-34844.json index 95a1c1c0629..435cc1d765c 100644 --- a/2022/34xxx/CVE-2022-34844.json +++ b/2022/34xxx/CVE-2022-34844.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-34844", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP and BIG-IQ AWS vulnerability CVE-2022-34844" }, "affects": { diff --git a/2022/34xxx/CVE-2022-34851.json b/2022/34xxx/CVE-2022-34851.json index a6d3df4b927..b44fdba78c8 100644 --- a/2022/34xxx/CVE-2022-34851.json +++ b/2022/34xxx/CVE-2022-34851.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-34851", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP and BIG-IQ iControl SOAP vulnerability CVE-2022-34851" }, "affects": { diff --git a/2022/34xxx/CVE-2022-34862.json b/2022/34xxx/CVE-2022-34862.json index 1ac66ce0f76..030ea13f07a 100644 --- a/2022/34xxx/CVE-2022-34862.json +++ b/2022/34xxx/CVE-2022-34862.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-34862", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "TMM vulnerability CVE-2022-34862" }, "affects": { diff --git a/2022/34xxx/CVE-2022-34865.json b/2022/34xxx/CVE-2022-34865.json index a0b6ea96aaf..e79d6c137e5 100644 --- a/2022/34xxx/CVE-2022-34865.json +++ b/2022/34xxx/CVE-2022-34865.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-34865", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "Traffic intelligence feeds vulnerability CVE-2022-34865" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35236.json b/2022/35xxx/CVE-2022-35236.json index 8321659871a..54d87f64938 100644 --- a/2022/35xxx/CVE-2022-35236.json +++ b/2022/35xxx/CVE-2022-35236.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35236", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "HTTP2 profile vulnerability CVE-2022-35236" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35240.json b/2022/35xxx/CVE-2022-35240.json index 4876b6a358f..fc4891562fc 100644 --- a/2022/35xxx/CVE-2022-35240.json +++ b/2022/35xxx/CVE-2022-35240.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35240", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP Message Routing MQTT vulnerability CVE-2022-35240" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35241.json b/2022/35xxx/CVE-2022-35241.json index 53c050b5098..4e87698e227 100644 --- a/2022/35xxx/CVE-2022-35241.json +++ b/2022/35xxx/CVE-2022-35241.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35241", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "NGINX Instance Manager vulnerability CVE-2022-35241" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35243.json b/2022/35xxx/CVE-2022-35243.json index 4491c596c8b..d5b42a35d15 100644 --- a/2022/35xxx/CVE-2022-35243.json +++ b/2022/35xxx/CVE-2022-35243.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35243", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "Authenticated iControl REST in Appliance mode vulnerability CVE-2022-35243" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35245.json b/2022/35xxx/CVE-2022-35245.json index 61a6401e0dc..261d883b9fa 100644 --- a/2022/35xxx/CVE-2022-35245.json +++ b/2022/35xxx/CVE-2022-35245.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35245", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP APM access policy vulnerability CVE-2022-35245" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35272.json b/2022/35xxx/CVE-2022-35272.json index 7edee3c9263..1f720ba2cfa 100644 --- a/2022/35xxx/CVE-2022-35272.json +++ b/2022/35xxx/CVE-2022-35272.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35272", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP HTTP MRF vulnerability CVE-2022-35272" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35728.json b/2022/35xxx/CVE-2022-35728.json index 4e5cc56953f..77cc0f23334 100644 --- a/2022/35xxx/CVE-2022-35728.json +++ b/2022/35xxx/CVE-2022-35728.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35728", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "iControl REST vulnerability CVE-2022-35728" }, "affects": { diff --git a/2022/35xxx/CVE-2022-35735.json b/2022/35xxx/CVE-2022-35735.json index b167761611f..51dd9489058 100644 --- a/2022/35xxx/CVE-2022-35735.json +++ b/2022/35xxx/CVE-2022-35735.json @@ -3,7 +3,7 @@ "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-08-03T14:00:00.000Z", "ID": "CVE-2022-35735", - "STATE": "DRAFT", + "STATE": "PUBLIC", "TITLE": "BIG-IP monitor configuration vulnerability CVE-2022-35735" }, "affects": {