diff --git a/2018/21xxx/CVE-2018-21266.json b/2018/21xxx/CVE-2018-21266.json index 6257a7cbfca..444c0e1868e 100644 --- a/2018/21xxx/CVE-2018-21266.json +++ b/2018/21xxx/CVE-2018-21266.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2018-21266", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none." } ] } diff --git a/2018/21xxx/CVE-2018-21267.json b/2018/21xxx/CVE-2018-21267.json index 1c2ea8afb91..3eb87122a28 100644 --- a/2018/21xxx/CVE-2018-21267.json +++ b/2018/21xxx/CVE-2018-21267.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2018-21267", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none." } ] } diff --git a/2020/15xxx/CVE-2020-15270.json b/2020/15xxx/CVE-2020-15270.json index 7c552a241ce..bcf254b9643 100644 --- a/2020/15xxx/CVE-2020-15270.json +++ b/2020/15xxx/CVE-2020-15270.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens.\nThe issue is not patched." + "value": "Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched." } ] }, diff --git a/2020/1xxx/CVE-2020-1945.json b/2020/1xxx/CVE-2020-1945.json index 3306e720d39..c2e74c429fe 100644 --- a/2020/1xxx/CVE-2020-1945.json +++ b/2020/1xxx/CVE-2020-1945.json @@ -218,6 +218,11 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2020.html" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20201022 [jira] [Commented] (HIVE-23583) Fix CVE-2020-1945: Apache Ant insecure temporary file vulnerability by updating to latest ANT", + "url": "https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E" } ] },