From e11153fb407ce0d888180fb170c8e02c6292e60d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 12 May 2020 21:01:25 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11057.json | 2 +- 2020/11xxx/CVE-2020-11058.json | 2 +- 2020/1xxx/CVE-2020-1718.json | 3 ++- 3 files changed, 4 insertions(+), 3 deletions(-) diff --git a/2020/11xxx/CVE-2020-11057.json b/2020/11xxx/CVE-2020-11057.json index c7a13c4f121..af6c15f45a4 100644 --- a/2020/11xxx/CVE-2020-11057.json +++ b/2020/11xxx/CVE-2020-11057.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In XWiki Platform 7.2 through 11.10.2, registered users without scripting/programming permissions are able to execute python/groovy scripts while editing personal dashboards.\n\nThis has been fixed 11.3.7 , 11.10.3 and 12.0." + "value": "In XWiki Platform 7.2 through 11.10.2, registered users without scripting/programming permissions are able to execute python/groovy scripts while editing personal dashboards. This has been fixed 11.3.7 , 11.10.3 and 12.0." } ] }, diff --git a/2020/11xxx/CVE-2020-11058.json b/2020/11xxx/CVE-2020-11058.json index e1a4b860264..70c758bacaf 100644 --- a/2020/11xxx/CVE-2020-11058.json +++ b/2020/11xxx/CVE-2020-11058.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read.\n\nThis has been fixed in 2.0.0." + "value": "In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0." } ] }, diff --git a/2020/1xxx/CVE-2020-1718.json b/2020/1xxx/CVE-2020-1718.json index 78b3df17f7b..3c62d72bd4f 100644 --- a/2020/1xxx/CVE-2020-1718.json +++ b/2020/1xxx/CVE-2020-1718.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1718", - "ASSIGNER": "gsuckevi@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": {