diff --git a/2015/0xxx/CVE-2015-0787.json b/2015/0xxx/CVE-2015-0787.json index b198ef02ed9..5377454af43 100644 --- a/2015/0xxx/CVE-2015-0787.json +++ b/2015/0xxx/CVE-2015-0787.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-0787", "STATE": "PUBLIC" }, diff --git a/2015/0xxx/CVE-2015-0795.json b/2015/0xxx/CVE-2015-0795.json index fcc9906c05e..1a1f4acc057 100644 --- a/2015/0xxx/CVE-2015-0795.json +++ b/2015/0xxx/CVE-2015-0795.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-0795", "STATE": "PUBLIC" }, diff --git a/2015/8xxx/CVE-2015-8842.json b/2015/8xxx/CVE-2015-8842.json index f0996b97c9d..2c0c6785c57 100644 --- a/2015/8xxx/CVE-2015-8842.json +++ b/2015/8xxx/CVE-2015-8842.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-8842", "STATE": "PUBLIC" }, diff --git a/2016/1xxx/CVE-2016-1603.json b/2016/1xxx/CVE-2016-1603.json index 49223c4e8c7..2d11a7388c9 100644 --- a/2016/1xxx/CVE-2016-1603.json +++ b/2016/1xxx/CVE-2016-1603.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-1603", "STATE": "PUBLIC" }, diff --git a/2016/3xxx/CVE-2016-3136.json b/2016/3xxx/CVE-2016-3136.json index c40d84f3c86..24bbbef7ed0 100644 --- a/2016/3xxx/CVE-2016-3136.json +++ b/2016/3xxx/CVE-2016-3136.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-3136", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5750.json b/2016/5xxx/CVE-2016-5750.json index 5f50b4e7b48..ab4c15037d5 100644 --- a/2016/5xxx/CVE-2016-5750.json +++ b/2016/5xxx/CVE-2016-5750.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-5750", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5762.json b/2016/5xxx/CVE-2016-5762.json index a73e990bcb8..4bca65d09fa 100644 --- a/2016/5xxx/CVE-2016-5762.json +++ b/2016/5xxx/CVE-2016-5762.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-5762", "STATE": "PUBLIC" }, diff --git a/2016/9xxx/CVE-2016-9167.json b/2016/9xxx/CVE-2016-9167.json index 33c05abe9cd..39b6206ca3b 100644 --- a/2016/9xxx/CVE-2016-9167.json +++ b/2016/9xxx/CVE-2016-9167.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-9167", "STATE": "PUBLIC" }, diff --git a/2017/13xxx/CVE-2017-13985.json b/2017/13xxx/CVE-2017-13985.json index 7a5e1c8cc38..480b1e8aecb 100644 --- a/2017/13xxx/CVE-2017-13985.json +++ b/2017/13xxx/CVE-2017-13985.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-13985", "STATE": "PUBLIC" }, diff --git a/2017/14xxx/CVE-2017-14349.json b/2017/14xxx/CVE-2017-14349.json index edbb5dbca42..69504ef3c5a 100644 --- a/2017/14xxx/CVE-2017-14349.json +++ b/2017/14xxx/CVE-2017-14349.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-14349", "STATE": "PUBLIC" }, diff --git a/2017/14xxx/CVE-2017-14798.json b/2017/14xxx/CVE-2017-14798.json index 68909b5e5df..b73ab09b6b9 100644 --- a/2017/14xxx/CVE-2017-14798.json +++ b/2017/14xxx/CVE-2017-14798.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-11-27T00:00:00.000Z", "ID": "CVE-2017-14798", "STATE": "PUBLIC", diff --git a/2017/14xxx/CVE-2017-14806.json b/2017/14xxx/CVE-2017-14806.json index f915e8867f6..0088bc1fef7 100644 --- a/2017/14xxx/CVE-2017-14806.json +++ b/2017/14xxx/CVE-2017-14806.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "ID": "CVE-2017-14806", "STATE": "PUBLIC", diff --git a/2017/9xxx/CVE-2017-9275.json b/2017/9xxx/CVE-2017-9275.json index 518f9d3bc95..83b06a847cf 100644 --- a/2017/9xxx/CVE-2017-9275.json +++ b/2017/9xxx/CVE-2017-9275.json @@ -1,7 +1,7 @@ { "CVE_data_meta": { "AKA": "", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-9275", "STATE": "PUBLIC", "TITLE": "NetIQ Identity Reporting XSS exposure" diff --git a/2018/12xxx/CVE-2018-12478.json b/2018/12xxx/CVE-2018-12478.json index aa5268be79b..0d089fe28e3 100644 --- a/2018/12xxx/CVE-2018-12478.json +++ b/2018/12xxx/CVE-2018-12478.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-26T00:00:00.000Z", "ID": "CVE-2018-12478", "STATE": "PUBLIC", diff --git a/2018/17xxx/CVE-2018-17955.json b/2018/17xxx/CVE-2018-17955.json index 2e530a00ff6..ce9d2cacbdd 100644 --- a/2018/17xxx/CVE-2018-17955.json +++ b/2018/17xxx/CVE-2018-17955.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2019-01-07T00:00:00.000Z", "ID": "CVE-2018-17955", "STATE": "PUBLIC", diff --git a/2018/18xxx/CVE-2018-18591.json b/2018/18xxx/CVE-2018-18591.json index a739175c7f8..bbbf57be2dd 100644 --- a/2018/18xxx/CVE-2018-18591.json +++ b/2018/18xxx/CVE-2018-18591.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-11-12T17:00:00.000Z", "ID": "CVE-2018-18591", "STATE": "PUBLIC", diff --git a/2018/19xxx/CVE-2018-19641.json b/2018/19xxx/CVE-2018-19641.json index 0ff4170bb6c..5c5b4590598 100644 --- a/2018/19xxx/CVE-2018-19641.json +++ b/2018/19xxx/CVE-2018-19641.json @@ -7,7 +7,7 @@ }, "CVE_data_meta": { "ID": "CVE-2018-19641", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2019-01-23T01:00:00.000Z", "TITLE": "Solutions Business Manager (SBM) Unauthenticated remote code execution issue in version prior to 11.5", "AKA": "", diff --git a/2018/6xxx/CVE-2018-6504.json b/2018/6xxx/CVE-2018-6504.json index 9a666e3b51f..ef5bade1a33 100644 --- a/2018/6xxx/CVE-2018-6504.json +++ b/2018/6xxx/CVE-2018-6504.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-19T15:55:00.000Z", "ID": "CVE-2018-6504", "STATE": "PUBLIC", diff --git a/2018/7xxx/CVE-2018-7673.json b/2018/7xxx/CVE-2018-7673.json index b169ab8ff20..037d00df8c9 100644 --- a/2018/7xxx/CVE-2018-7673.json +++ b/2018/7xxx/CVE-2018-7673.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-7673", "STATE": "PUBLIC", "TITLE": "NetIQ Identity Manager DoS Attack" diff --git a/2018/7xxx/CVE-2018-7675.json b/2018/7xxx/CVE-2018-7675.json index 632e53e859e..3852c211d76 100644 --- a/2018/7xxx/CVE-2018-7675.json +++ b/2018/7xxx/CVE-2018-7675.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-7675", "STATE": "PUBLIC", "TITLE": "Potential Information Disclosure in Sentinel" diff --git a/2018/7xxx/CVE-2018-7687.json b/2018/7xxx/CVE-2018-7687.json index a0545205be3..51f530e74d2 100644 --- a/2018/7xxx/CVE-2018-7687.json +++ b/2018/7xxx/CVE-2018-7687.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-05-18T18:00:00.000Z", "ID": "CVE-2018-7687", "STATE": "PUBLIC", diff --git a/2019/11xxx/CVE-2019-11657.json b/2019/11xxx/CVE-2019-11657.json index 2ad01caa2f5..ec1d44b2763 100644 --- a/2019/11xxx/CVE-2019-11657.json +++ b/2019/11xxx/CVE-2019-11657.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11657", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/11xxx/CVE-2019-11668.json b/2019/11xxx/CVE-2019-11668.json index 9f11f782dba..338c6c39b8a 100644 --- a/2019/11xxx/CVE-2019-11668.json +++ b/2019/11xxx/CVE-2019-11668.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11668", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/11xxx/CVE-2019-11674.json b/2019/11xxx/CVE-2019-11674.json index 6c918b6ecf7..45f5759320f 100644 --- a/2019/11xxx/CVE-2019-11674.json +++ b/2019/11xxx/CVE-2019-11674.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11674", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/17xxx/CVE-2019-17084.json b/2019/17xxx/CVE-2019-17084.json new file mode 100644 index 00000000000..0098a76a22f --- /dev/null +++ b/2019/17xxx/CVE-2019-17084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-17084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17087.json b/2019/17xxx/CVE-2019-17087.json index 154bd31752b..50400d8e5f4 100644 --- a/2019/17xxx/CVE-2019-17087.json +++ b/2019/17xxx/CVE-2019-17087.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-17087", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/3xxx/CVE-2019-3476.json b/2019/3xxx/CVE-2019-3476.json index 929a506a87a..f4972f9d9ad 100644 --- a/2019/3xxx/CVE-2019-3476.json +++ b/2019/3xxx/CVE-2019-3476.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3476", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/3xxx/CVE-2019-3477.json b/2019/3xxx/CVE-2019-3477.json index 5690ed4dccd..9a0f1cfb6d9 100644 --- a/2019/3xxx/CVE-2019-3477.json +++ b/2019/3xxx/CVE-2019-3477.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3477", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2020/11xxx/CVE-2020-11839.json b/2020/11xxx/CVE-2020-11839.json index 20352e1ec3d..4a986815f64 100644 --- a/2020/11xxx/CVE-2020-11839.json +++ b/2020/11xxx/CVE-2020-11839.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-11839", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2020/11xxx/CVE-2020-11849.json b/2020/11xxx/CVE-2020-11849.json index 13bc4409ee6..4a1f6113ba1 100644 --- a/2020/11xxx/CVE-2020-11849.json +++ b/2020/11xxx/CVE-2020-11849.json @@ -7,7 +7,7 @@ }, "CVE_data_meta": { "ID": "CVE-2020-11849", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2020-07-07T20:00:00.000Z", "TITLE": "Elevation of privilege and unauthorized access in Micro Focus Identity Manager product ", "STATE": "PUBLIC" diff --git a/2020/11xxx/CVE-2020-11853.json b/2020/11xxx/CVE-2020-11853.json index 81d3ee472e1..7ccfbcfc69c 100644 --- a/2020/11xxx/CVE-2020-11853.json +++ b/2020/11xxx/CVE-2020-11853.json @@ -7,7 +7,7 @@ }, "CVE_data_meta": { "ID": "CVE-2020-11853", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "TITLE": "Arbitrary code execution vulnerability on multiple Micro Focus products ", "STATE": "PUBLIC" }, diff --git a/2020/11xxx/CVE-2020-11854.json b/2020/11xxx/CVE-2020-11854.json index 1a264bb519b..ea3dbcb383a 100644 --- a/2020/11xxx/CVE-2020-11854.json +++ b/2020/11xxx/CVE-2020-11854.json @@ -7,7 +7,7 @@ }, "CVE_data_meta": { "ID": "CVE-2020-11854", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "TITLE": "Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) products.", "STATE": "PUBLIC" }, diff --git a/2020/9xxx/CVE-2020-9521.json b/2020/9xxx/CVE-2020-9521.json index 5d45b42c868..2fabb52b574 100644 --- a/2020/9xxx/CVE-2020-9521.json +++ b/2020/9xxx/CVE-2020-9521.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9521", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": {