diff --git a/2017/14xxx/CVE-2017-14245.json b/2017/14xxx/CVE-2017-14245.json index df8f36a136b..0d1eacb9721 100644 --- a/2017/14xxx/CVE-2017-14245.json +++ b/2017/14xxx/CVE-2017-14245.json @@ -66,6 +66,11 @@ "refsource": "UBUNTU", "name": "USN-4013-1", "url": "https://usn.ubuntu.com/4013-1/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-65", + "url": "https://security.gentoo.org/glsa/202007-65" } ] } diff --git a/2017/14xxx/CVE-2017-14246.json b/2017/14xxx/CVE-2017-14246.json index 650f5d985cf..b331c6ea1ac 100644 --- a/2017/14xxx/CVE-2017-14246.json +++ b/2017/14xxx/CVE-2017-14246.json @@ -66,6 +66,11 @@ "refsource": "UBUNTU", "name": "USN-4013-1", "url": "https://usn.ubuntu.com/4013-1/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-65", + "url": "https://security.gentoo.org/glsa/202007-65" } ] } diff --git a/2019/3xxx/CVE-2019-3832.json b/2019/3xxx/CVE-2019-3832.json index 58eb67d2fc9..65ba5729305 100644 --- a/2019/3xxx/CVE-2019-3832.json +++ b/2019/3xxx/CVE-2019-3832.json @@ -63,6 +63,11 @@ "refsource": "UBUNTU", "name": "USN-4013-1", "url": "https://usn.ubuntu.com/4013-1/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202007-65", + "url": "https://security.gentoo.org/glsa/202007-65" } ] }, diff --git a/2020/14xxx/CVE-2020-14158.json b/2020/14xxx/CVE-2020-14158.json index 73c2f494227..991bec86781 100644 --- a/2020/14xxx/CVE-2020-14158.json +++ b/2020/14xxx/CVE-2020-14158.json @@ -61,6 +61,11 @@ "refsource": "FULLDISC", "name": "20200730 [SYSS-2020-015]: ABUS Secvest Hybrid module (FUMO50110) - Authentication Bypass Using an Alternate Path or Channel (CWE-288) (CVE-2020-14158)", "url": "http://seclists.org/fulldisclosure/2020/Jul/36" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/158692/ABUS-Secvest-Hybrid-Module-FUMO50110-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/158692/ABUS-Secvest-Hybrid-Module-FUMO50110-Authentication-Bypass.html" } ] } diff --git a/2020/14xxx/CVE-2020-14310.json b/2020/14xxx/CVE-2020-14310.json index 08ecad76a55..ddeec4874bb 100644 --- a/2020/14xxx/CVE-2020-14310.json +++ b/2020/14xxx/CVE-2020-14310.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-14310", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -76,4 +77,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14311.json b/2020/14xxx/CVE-2020-14311.json index 9d68479d3ca..1d5505bd2bf 100644 --- a/2020/14xxx/CVE-2020-14311.json +++ b/2020/14xxx/CVE-2020-14311.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-14311", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -76,4 +77,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2020/1xxx/CVE-2020-1147.json b/2020/1xxx/CVE-2020-1147.json index 83a1a757fb8..27185009842 100644 --- a/2020/1xxx/CVE-2020-1147.json +++ b/2020/1xxx/CVE-2020-1147.json @@ -831,6 +831,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html", + "url": "http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html" } ] } diff --git a/2020/7xxx/CVE-2020-7457.json b/2020/7xxx/CVE-2020-7457.json index 29aba1fa0c9..b8d5bb22a3a 100644 --- a/2020/7xxx/CVE-2020-7457.json +++ b/2020/7xxx/CVE-2020-7457.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200724-0002/", "url": "https://security.netapp.com/advisory/ntap-20200724-0002/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8010.json b/2020/8xxx/CVE-2020-8010.json index dcaa24a7e5c..47e2837adff 100644 --- a/2020/8xxx/CVE-2020-8010.json +++ b/2020/8xxx/CVE-2020-8010.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://techdocs.broadcom.com/us/product-content/status/announcement-documents/2019/ca20200205-01-security-notice-for-ca-unified-infrastructure-management.html", "url": "https://techdocs.broadcom.com/us/product-content/status/announcement-documents/2019/ca20200205-01-security-notice-for-ca-unified-infrastructure-management.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8012.json b/2020/8xxx/CVE-2020-8012.json index 7b33a5db015..d9f39c46895 100644 --- a/2020/8xxx/CVE-2020-8012.json +++ b/2020/8xxx/CVE-2020-8012.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html" } ] },