diff --git a/2020/5xxx/CVE-2020-5627.json b/2020/5xxx/CVE-2020-5627.json index f396d4dad6a..09cd33da7b3 100644 --- a/2020/5xxx/CVE-2020-5627.json +++ b/2020/5xxx/CVE-2020-5627.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5627", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN77402327/index.html" + "url": "https://jvn.jp/en/jp/JVN77402327/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN77402327/index.html" } ] }, @@ -52,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "Yodobashi App for Android versions 1.8.7 and earlier allows remote attackers to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack." + "value": "Yodobashi App for Android versions 1.8.7 and earlier allows remote attackers to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack." } ] }