diff --git a/2020/28xxx/CVE-2020-28476.json b/2020/28xxx/CVE-2020-28476.json index a13ba9696a8..040b5270f53 100644 --- a/2020/28xxx/CVE-2020-28476.json +++ b/2020/28xxx/CVE-2020-28476.json @@ -3,90 +3,16 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "report@snyk.io", - "DATE_PUBLIC": "2021-01-18T11:12:05.394086Z", "ID": "CVE-2020-28476", - "STATE": "PUBLIC", - "TITLE": "Web Cache Poisoning" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "tornado", - "version": { - "version_data": [ - { - "version_affected": ">=", - "version_value": "0" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Web Cache Poisoning" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "MISC", - "url": "https://snyk.io/vuln/SNYK-PYTHON-TORNADO-1017109", - "name": "https://snyk.io/vuln/SNYK-PYTHON-TORNADO-1017109" - }, - { - "refsource": "CONFIRM", - "name": "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/", - "url": "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/" - } - ] + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-23336. Reason: This candidate is a reservation duplicate of CVE-2021-23336. Notes: All CVE users should reference CVE-2021-23336 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] - }, - "impact": { - "cvss": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:U/RC:C", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - } - }, - "credit": [ - { - "lang": "eng", - "value": "Snyk Security Team" - } - ] + } } \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35512.json b/2020/35xxx/CVE-2020-35512.json index b31a20fe57a..57cc6c13d5d 100644 --- a/2020/35xxx/CVE-2020-35512.json +++ b/2020/35xxx/CVE-2020-35512.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-35512", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "dbus", + "version": { + "version_data": [ + { + "version_value": "dbus 1.10.32, dbus 1.12.20, dbus 1.13.18" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use-After-Free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugs.gentoo.org/755392", + "url": "https://bugs.gentoo.org/755392" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free flaw was found in D-Bus 1.12.20 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors" } ] } diff --git a/2021/27xxx/CVE-2021-27217.json b/2021/27xxx/CVE-2021-27217.json new file mode 100644 index 00000000000..a682bfec9ea --- /dev/null +++ b/2021/27xxx/CVE-2021-27217.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27217", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27218.json b/2021/27xxx/CVE-2021-27218.json new file mode 100644 index 00000000000..9d889c7a4c1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27218.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27218", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942", + "refsource": "MISC", + "name": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942" + }, + { + "url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944", + "refsource": "MISC", + "name": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27219.json b/2021/27xxx/CVE-2021-27219.json new file mode 100644 index 00000000000..59975eba2d9 --- /dev/null +++ b/2021/27xxx/CVE-2021-27219.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27219", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.gnome.org/GNOME/glib/-/issues/2319", + "refsource": "MISC", + "name": "https://gitlab.gnome.org/GNOME/glib/-/issues/2319" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27220.json b/2021/27xxx/CVE-2021-27220.json new file mode 100644 index 00000000000..f62dfbe14cf --- /dev/null +++ b/2021/27xxx/CVE-2021-27220.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27220", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27221.json b/2021/27xxx/CVE-2021-27221.json new file mode 100644 index 00000000000..f1776e2643a --- /dev/null +++ b/2021/27xxx/CVE-2021-27221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27222.json b/2021/27xxx/CVE-2021-27222.json new file mode 100644 index 00000000000..740145bdac7 --- /dev/null +++ b/2021/27xxx/CVE-2021-27222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file