From a2663adf9a5194b17a694f04a39db448d3206739 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 6 Jan 2021 17:08:23 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2015/0xxx/CVE-2015-0780.json | 2 +- 2015/0xxx/CVE-2015-0783.json | 2 +- 2015/0xxx/CVE-2015-0786.json | 2 +- 2015/5xxx/CVE-2015-5968.json | 2 +- 2015/5xxx/CVE-2015-5969.json | 2 +- 2016/1xxx/CVE-2016-1593.json | 2 +- 2016/1xxx/CVE-2016-1605.json | 2 +- 2016/1xxx/CVE-2016-1606.json | 2 +- 2016/3xxx/CVE-2016-3135.json | 2 +- 2016/3xxx/CVE-2016-3142.json | 2 +- 2016/4xxx/CVE-2016-4579.json | 2 +- 2016/5xxx/CVE-2016-5360.json | 2 +- 2016/5xxx/CVE-2016-5755.json | 2 +- 2016/5xxx/CVE-2016-5756.json | 2 +- 2016/5xxx/CVE-2016-5757.json | 2 +- 2016/7xxx/CVE-2016-7942.json | 2 +- 2016/7xxx/CVE-2016-7945.json | 2 +- 2016/7xxx/CVE-2016-7950.json | 2 +- 2017/14xxx/CVE-2017-14352.json | 2 +- 2017/14xxx/CVE-2017-14360.json | 2 +- 2017/14xxx/CVE-2017-14803.json | 2 +- 2017/5xxx/CVE-2017-5185.json | 2 +- 2017/7xxx/CVE-2017-7427.json | 2 +- 2017/7xxx/CVE-2017-7429.json | 2 +- 2017/9xxx/CVE-2017-9276.json | 2 +- 2017/9xxx/CVE-2017-9277.json | 2 +- 2017/9xxx/CVE-2017-9278.json | 2 +- 2017/9xxx/CVE-2017-9285.json | 2 +- 2017/9xxx/CVE-2017-9286.json | 2 +- 2018/12xxx/CVE-2018-12466.json | 2 +- 2018/12xxx/CVE-2018-12470.json | 2 +- 2018/12xxx/CVE-2018-12473.json | 2 +- 2018/12xxx/CVE-2018-12474.json | 2 +- 2018/17xxx/CVE-2018-17953.json | 2 +- 2018/19xxx/CVE-2018-19637.json | 2 +- 2018/19xxx/CVE-2018-19642.json | 2 +- 2018/1xxx/CVE-2018-1350.json | 2 +- 2018/6xxx/CVE-2018-6494.json | 2 +- 2018/6xxx/CVE-2018-6496.json | 2 +- 2018/7xxx/CVE-2018-7676.json | 2 +- 2018/7xxx/CVE-2018-7679.json | 2 +- 2019/11xxx/CVE-2019-11646.json | 2 +- 2019/11xxx/CVE-2019-11647.json | 2 +- 2019/11xxx/CVE-2019-11654.json | 2 +- 2019/17xxx/CVE-2019-17089.json | 18 ++++++++++++++++++ 2020/11xxx/CVE-2020-11844.json | 2 +- 2020/11xxx/CVE-2020-11852.json | 2 +- 2020/11xxx/CVE-2020-11857.json | 2 +- 2020/25xxx/CVE-2020-25837.json | 2 +- 49 files changed, 66 insertions(+), 48 deletions(-) create mode 100644 2019/17xxx/CVE-2019-17089.json diff --git a/2015/0xxx/CVE-2015-0780.json b/2015/0xxx/CVE-2015-0780.json index 9f2f37f87d3..3b2504f4826 100644 --- a/2015/0xxx/CVE-2015-0780.json +++ b/2015/0xxx/CVE-2015-0780.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "ID": "CVE-2015-0780", "STATE": "PUBLIC" }, diff --git a/2015/0xxx/CVE-2015-0783.json b/2015/0xxx/CVE-2015-0783.json index 5701d9e4b37..8cffd1417da 100644 --- a/2015/0xxx/CVE-2015-0783.json +++ b/2015/0xxx/CVE-2015-0783.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-0783", "STATE": "PUBLIC" }, diff --git a/2015/0xxx/CVE-2015-0786.json b/2015/0xxx/CVE-2015-0786.json index 206c7792bc8..07c639faf38 100644 --- a/2015/0xxx/CVE-2015-0786.json +++ b/2015/0xxx/CVE-2015-0786.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-0786", "STATE": "PUBLIC" }, diff --git a/2015/5xxx/CVE-2015-5968.json b/2015/5xxx/CVE-2015-5968.json index 691a6101040..b7ad66e9761 100644 --- a/2015/5xxx/CVE-2015-5968.json +++ b/2015/5xxx/CVE-2015-5968.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-5968", "STATE": "PUBLIC" }, diff --git a/2015/5xxx/CVE-2015-5969.json b/2015/5xxx/CVE-2015-5969.json index 617f8c09fab..3d06b693f9f 100644 --- a/2015/5xxx/CVE-2015-5969.json +++ b/2015/5xxx/CVE-2015-5969.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-5969", "STATE": "PUBLIC" }, diff --git a/2016/1xxx/CVE-2016-1593.json b/2016/1xxx/CVE-2016-1593.json index ac26d2fef75..8f2f30cac03 100644 --- a/2016/1xxx/CVE-2016-1593.json +++ b/2016/1xxx/CVE-2016-1593.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-1593", "STATE": "PUBLIC" }, diff --git a/2016/1xxx/CVE-2016-1605.json b/2016/1xxx/CVE-2016-1605.json index f1fa2a72e74..df6e09f78fd 100644 --- a/2016/1xxx/CVE-2016-1605.json +++ b/2016/1xxx/CVE-2016-1605.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-1605", "STATE": "PUBLIC" }, diff --git a/2016/1xxx/CVE-2016-1606.json b/2016/1xxx/CVE-2016-1606.json index 49a0f46dcb6..067d829b1c8 100644 --- a/2016/1xxx/CVE-2016-1606.json +++ b/2016/1xxx/CVE-2016-1606.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-1606", "STATE": "PUBLIC" }, diff --git a/2016/3xxx/CVE-2016-3135.json b/2016/3xxx/CVE-2016-3135.json index b462f8f50d6..0a907454f7e 100644 --- a/2016/3xxx/CVE-2016-3135.json +++ b/2016/3xxx/CVE-2016-3135.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-3135", "STATE": "PUBLIC" }, diff --git a/2016/3xxx/CVE-2016-3142.json b/2016/3xxx/CVE-2016-3142.json index 4352d873b7e..3c89e8673a7 100644 --- a/2016/3xxx/CVE-2016-3142.json +++ b/2016/3xxx/CVE-2016-3142.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-3142", "STATE": "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4579.json b/2016/4xxx/CVE-2016-4579.json index 41242b53b05..bd82129046c 100644 --- a/2016/4xxx/CVE-2016-4579.json +++ b/2016/4xxx/CVE-2016-4579.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "ID": "CVE-2016-4579", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5360.json b/2016/5xxx/CVE-2016-5360.json index 2f00192fca8..2f4a13a624d 100644 --- a/2016/5xxx/CVE-2016-5360.json +++ b/2016/5xxx/CVE-2016-5360.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-5360", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5755.json b/2016/5xxx/CVE-2016-5755.json index a9f1c3a0994..a094d9c9071 100644 --- a/2016/5xxx/CVE-2016-5755.json +++ b/2016/5xxx/CVE-2016-5755.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "ID": "CVE-2016-5755", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5756.json b/2016/5xxx/CVE-2016-5756.json index a0f2a8d4e8f..bd2c6d24eef 100644 --- a/2016/5xxx/CVE-2016-5756.json +++ b/2016/5xxx/CVE-2016-5756.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "ID": "CVE-2016-5756", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5757.json b/2016/5xxx/CVE-2016-5757.json index 63a8a5f65ec..2aa639cbe4b 100644 --- a/2016/5xxx/CVE-2016-5757.json +++ b/2016/5xxx/CVE-2016-5757.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "ID": "CVE-2016-5757", "STATE": "PUBLIC" }, diff --git a/2016/7xxx/CVE-2016-7942.json b/2016/7xxx/CVE-2016-7942.json index 5de3123ad9f..f9bec46f160 100644 --- a/2016/7xxx/CVE-2016-7942.json +++ b/2016/7xxx/CVE-2016-7942.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-7942", "STATE": "PUBLIC" }, diff --git a/2016/7xxx/CVE-2016-7945.json b/2016/7xxx/CVE-2016-7945.json index dd3aa0e07c6..32dfb257d33 100644 --- a/2016/7xxx/CVE-2016-7945.json +++ b/2016/7xxx/CVE-2016-7945.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "ID": "CVE-2016-7945", "STATE": "PUBLIC" }, diff --git a/2016/7xxx/CVE-2016-7950.json b/2016/7xxx/CVE-2016-7950.json index 2ee62a7d4d1..a580351b96a 100644 --- a/2016/7xxx/CVE-2016-7950.json +++ b/2016/7xxx/CVE-2016-7950.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-7950", "STATE": "PUBLIC" }, diff --git a/2017/14xxx/CVE-2017-14352.json b/2017/14xxx/CVE-2017-14352.json index d5e43a915f1..faa0aeefc46 100644 --- a/2017/14xxx/CVE-2017-14352.json +++ b/2017/14xxx/CVE-2017-14352.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-14352", "STATE": "PUBLIC" }, diff --git a/2017/14xxx/CVE-2017-14360.json b/2017/14xxx/CVE-2017-14360.json index f20df44b03c..d087c09f775 100644 --- a/2017/14xxx/CVE-2017-14360.json +++ b/2017/14xxx/CVE-2017-14360.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-14360", "STATE": "PUBLIC", "TITLE": "MFSBGN03791 rev.1 - HPE Content Manager Workgroup Service, Denial of Service (DoS)" diff --git a/2017/14xxx/CVE-2017-14803.json b/2017/14xxx/CVE-2017-14803.json index 560a3baf523..eb9641bddb5 100644 --- a/2017/14xxx/CVE-2017-14803.json +++ b/2017/14xxx/CVE-2017-14803.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-12-08T00:00:00", "ID": "CVE-2017-14803", "STATE": "PUBLIC" diff --git a/2017/5xxx/CVE-2017-5185.json b/2017/5xxx/CVE-2017-5185.json index 7332c235205..9b4014c7a04 100644 --- a/2017/5xxx/CVE-2017-5185.json +++ b/2017/5xxx/CVE-2017-5185.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-5185", "STATE": "PUBLIC" }, diff --git a/2017/7xxx/CVE-2017-7427.json b/2017/7xxx/CVE-2017-7427.json index 4e555883007..e288e871247 100644 --- a/2017/7xxx/CVE-2017-7427.json +++ b/2017/7xxx/CVE-2017-7427.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2017-09-15T00:00:00.000Z", "ID": "CVE-2017-7427", "STATE": "PUBLIC", diff --git a/2017/7xxx/CVE-2017-7429.json b/2017/7xxx/CVE-2017-7429.json index e336c064d9d..4b33e1df2de 100644 --- a/2017/7xxx/CVE-2017-7429.json +++ b/2017/7xxx/CVE-2017-7429.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "ID": "CVE-2017-7429", "STATE": "PUBLIC", diff --git a/2017/9xxx/CVE-2017-9276.json b/2017/9xxx/CVE-2017-9276.json index 4d9465e6177..8d21e978392 100644 --- a/2017/9xxx/CVE-2017-9276.json +++ b/2017/9xxx/CVE-2017-9276.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-11-20T00:00:00.000Z", "ID": "CVE-2017-9276", "STATE": "PUBLIC", diff --git a/2017/9xxx/CVE-2017-9277.json b/2017/9xxx/CVE-2017-9277.json index 863b6d310d3..835114f4084 100644 --- a/2017/9xxx/CVE-2017-9277.json +++ b/2017/9xxx/CVE-2017-9277.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "ID": "CVE-2017-9277", "STATE": "PUBLIC", diff --git a/2017/9xxx/CVE-2017-9278.json b/2017/9xxx/CVE-2017-9278.json index fadc7677b95..38b90803e23 100644 --- a/2017/9xxx/CVE-2017-9278.json +++ b/2017/9xxx/CVE-2017-9278.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-09-01T00:00:00.000Z", "ID": "CVE-2017-9278", "STATE": "PUBLIC", diff --git a/2017/9xxx/CVE-2017-9285.json b/2017/9xxx/CVE-2017-9285.json index f47c9ea6159..3bc3db9ad2d 100644 --- a/2017/9xxx/CVE-2017-9285.json +++ b/2017/9xxx/CVE-2017-9285.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "ID": "CVE-2017-9285", "STATE": "PUBLIC", diff --git a/2017/9xxx/CVE-2017-9286.json b/2017/9xxx/CVE-2017-9286.json index 6217ea0125c..2f1c4c46f3e 100644 --- a/2017/9xxx/CVE-2017-9286.json +++ b/2017/9xxx/CVE-2017-9286.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2017-10-04T00:00:00.000Z", "ID": "CVE-2017-9286", "STATE": "PUBLIC", diff --git a/2018/12xxx/CVE-2018-12466.json b/2018/12xxx/CVE-2018-12466.json index 27d7a108d9c..97394fa91d7 100644 --- a/2018/12xxx/CVE-2018-12466.json +++ b/2018/12xxx/CVE-2018-12466.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@microfocus.com", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2018-07-24T00:00:00.000Z", "ID": "CVE-2018-12466", "STATE": "PUBLIC", diff --git a/2018/12xxx/CVE-2018-12470.json b/2018/12xxx/CVE-2018-12470.json index cc1f35a8a91..19271e1ff73 100644 --- a/2018/12xxx/CVE-2018-12470.json +++ b/2018/12xxx/CVE-2018-12470.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-27T00:00:00.000Z", "ID": "CVE-2018-12470", "STATE": "PUBLIC", diff --git a/2018/12xxx/CVE-2018-12473.json b/2018/12xxx/CVE-2018-12473.json index 640dfb206db..4db3252bd3b 100644 --- a/2018/12xxx/CVE-2018-12473.json +++ b/2018/12xxx/CVE-2018-12473.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-26T00:00:00.000Z", "ID": "CVE-2018-12473", "STATE": "PUBLIC", diff --git a/2018/12xxx/CVE-2018-12474.json b/2018/12xxx/CVE-2018-12474.json index a5e8957b404..fd98ca996dd 100644 --- a/2018/12xxx/CVE-2018-12474.json +++ b/2018/12xxx/CVE-2018-12474.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-26T00:00:00.000Z", "ID": "CVE-2018-12474", "STATE": "PUBLIC", diff --git a/2018/17xxx/CVE-2018-17953.json b/2018/17xxx/CVE-2018-17953.json index a3c00a40097..cbf41d28985 100644 --- a/2018/17xxx/CVE-2018-17953.json +++ b/2018/17xxx/CVE-2018-17953.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-11-15T00:00:00.000Z", "ID": "CVE-2018-17953", "STATE": "PUBLIC", diff --git a/2018/19xxx/CVE-2018-19637.json b/2018/19xxx/CVE-2018-19637.json index 4398f01e097..131e3309151 100644 --- a/2018/19xxx/CVE-2018-19637.json +++ b/2018/19xxx/CVE-2018-19637.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2019-02-21T00:00:00.000Z", "ID": "CVE-2018-19637", "STATE": "PUBLIC", diff --git a/2018/19xxx/CVE-2018-19642.json b/2018/19xxx/CVE-2018-19642.json index ab7bc3665a0..4b0498eeb11 100644 --- a/2018/19xxx/CVE-2018-19642.json +++ b/2018/19xxx/CVE-2018-19642.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2019-01-23T01:00:00.000Z", "ID": "CVE-2018-19642", "STATE": "PUBLIC", diff --git a/2018/1xxx/CVE-2018-1350.json b/2018/1xxx/CVE-2018-1350.json index e348686297e..7dcb92e3d48 100644 --- a/2018/1xxx/CVE-2018-1350.json +++ b/2018/1xxx/CVE-2018-1350.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-1350", "STATE": "PUBLIC", "TITLE": "NetIQ Identity Manager Driver Component Information Leakage " diff --git a/2018/6xxx/CVE-2018-6494.json b/2018/6xxx/CVE-2018-6494.json index 43550591b2c..806ff451195 100644 --- a/2018/6xxx/CVE-2018-6494.json +++ b/2018/6xxx/CVE-2018-6494.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-05-10T19:01:00.000Z", "ID": "CVE-2018-6494", "STATE": "PUBLIC", diff --git a/2018/6xxx/CVE-2018-6496.json b/2018/6xxx/CVE-2018-6496.json index 06fccdf45f6..61b13956598 100644 --- a/2018/6xxx/CVE-2018-6496.json +++ b/2018/6xxx/CVE-2018-6496.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-6496", "STATE": "PUBLIC", "TITLE": "MFSBGN03809 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF" diff --git a/2018/7xxx/CVE-2018-7676.json b/2018/7xxx/CVE-2018-7676.json index f287e0fe158..152ce09b71f 100644 --- a/2018/7xxx/CVE-2018-7676.json +++ b/2018/7xxx/CVE-2018-7676.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-7676", "STATE": "PUBLIC", "TITLE": "IDM Information Leakage" diff --git a/2018/7xxx/CVE-2018-7679.json b/2018/7xxx/CVE-2018-7679.json index 08587ada114..d5565f18d3d 100644 --- a/2018/7xxx/CVE-2018-7679.json +++ b/2018/7xxx/CVE-2018-7679.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-06-20T00:00:00", "ID": "CVE-2018-7679", "STATE": "PUBLIC" diff --git a/2019/11xxx/CVE-2019-11646.json b/2019/11xxx/CVE-2019-11646.json index 5670d516f18..71cddebbce8 100644 --- a/2019/11xxx/CVE-2019-11646.json +++ b/2019/11xxx/CVE-2019-11646.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11646", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/11xxx/CVE-2019-11647.json b/2019/11xxx/CVE-2019-11647.json index f36cc4c5ce1..9798c9bf1ae 100644 --- a/2019/11xxx/CVE-2019-11647.json +++ b/2019/11xxx/CVE-2019-11647.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11647", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/11xxx/CVE-2019-11654.json b/2019/11xxx/CVE-2019-11654.json index 19cca8b1865..60ba53e3822 100644 --- a/2019/11xxx/CVE-2019-11654.json +++ b/2019/11xxx/CVE-2019-11654.json @@ -7,7 +7,7 @@ }, "CVE_data_meta": { "ID": "CVE-2019-11654", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "TITLE": "A path traversal vulnerability has been identified in Verastream Host Integrator ", "STATE": "PUBLIC" }, diff --git a/2019/17xxx/CVE-2019-17089.json b/2019/17xxx/CVE-2019-17089.json new file mode 100644 index 00000000000..6a295e57797 --- /dev/null +++ b/2019/17xxx/CVE-2019-17089.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-17089", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11844.json b/2020/11xxx/CVE-2020-11844.json index d9d27cabeba..b89397c7f1c 100644 --- a/2020/11xxx/CVE-2020-11844.json +++ b/2020/11xxx/CVE-2020-11844.json @@ -7,7 +7,7 @@ }, "CVE_data_meta": { "ID": "CVE-2020-11844", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "TITLE": "Incorrect Authorization vulnerability in the Micro Focus Container Deployment Foundation affecting multiple products.", "STATE": "PUBLIC" }, diff --git a/2020/11xxx/CVE-2020-11852.json b/2020/11xxx/CVE-2020-11852.json index 1ff54e740d1..4d959e36160 100644 --- a/2020/11xxx/CVE-2020-11852.json +++ b/2020/11xxx/CVE-2020-11852.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-11852", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2020/11xxx/CVE-2020-11857.json b/2020/11xxx/CVE-2020-11857.json index 50448d60516..5233755f834 100644 --- a/2020/11xxx/CVE-2020-11857.json +++ b/2020/11xxx/CVE-2020-11857.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-11857", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2020/25xxx/CVE-2020-25837.json b/2020/25xxx/CVE-2020-25837.json index ddb3f2ee17a..7dd6b6c823a 100644 --- a/2020/25xxx/CVE-2020-25837.json +++ b/2020/25xxx/CVE-2020-25837.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25837", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": {