From 151ecfb57777fceef638a24c0d8d18537f75d600 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 23 Nov 2020 21:01:56 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/16xxx/CVE-2018-16719.json | 53 +++++++++++++++++++++++++++-- 2018/16xxx/CVE-2018-16720.json | 53 +++++++++++++++++++++++++++-- 2018/16xxx/CVE-2018-16721.json | 53 +++++++++++++++++++++++++++-- 2018/16xxx/CVE-2018-16722.json | 53 +++++++++++++++++++++++++++-- 2018/16xxx/CVE-2018-16723.json | 53 +++++++++++++++++++++++++++-- 2020/15xxx/CVE-2020-15436.json | 50 ++++++++++++++++++++++++++-- 2020/15xxx/CVE-2020-15437.json | 50 ++++++++++++++++++++++++++-- 2020/24xxx/CVE-2020-24227.json | 56 +++++++++++++++++++++++++++---- 2020/26xxx/CVE-2020-26231.json | 2 +- 2020/28xxx/CVE-2020-28360.json | 61 ++++++++++++++++++++++++++++++---- 2020/28xxx/CVE-2020-28421.json | 5 +++ 2020/28xxx/CVE-2020-28975.json | 2 +- 12 files changed, 461 insertions(+), 30 deletions(-) diff --git a/2018/16xxx/CVE-2018-16719.json b/2018/16xxx/CVE-2018-16719.json index 45f1b303f8e..5c5f081306a 100644 --- a/2018/16xxx/CVE-2018-16719.json +++ b/2018/16xxx/CVE-2018-16719.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16719", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jingyun Antivirus v2.4.2.39, the driver file (hookbody.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x00221482." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_00221482", + "url": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_00221482" + }, + { + "refsource": "MISC", + "name": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19268", + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19268" } ] } diff --git a/2018/16xxx/CVE-2018-16720.json b/2018/16xxx/CVE-2018-16720.json index 2bfab2b24bc..13a933d1671 100644 --- a/2018/16xxx/CVE-2018-16720.json +++ b/2018/16xxx/CVE-2018-16720.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16720", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jingyun Antivirus v2.4.2.39, the driver file (ZySandbox.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x1236001c, a related issue to CVE-2018-16304." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_1236001c", + "refsource": "MISC", + "name": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_1236001c" + }, + { + "refsource": "MISC", + "name": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19267", + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19267" } ] } diff --git a/2018/16xxx/CVE-2018-16721.json b/2018/16xxx/CVE-2018-16721.json index 5594331e315..feb9abd8b59 100644 --- a/2018/16xxx/CVE-2018-16721.json +++ b/2018/16xxx/CVE-2018-16721.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16721", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jingyun Antivirus v2.4.2.39, the driver file (ZySandbox.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x12360090, a related issue to CVE-2018-16306." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_12360090", + "url": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_12360090" + }, + { + "refsource": "MISC", + "name": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19266", + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19266" } ] } diff --git a/2018/16xxx/CVE-2018-16722.json b/2018/16xxx/CVE-2018-16722.json index 9a709887bb1..94c15cd6a61 100644 --- a/2018/16xxx/CVE-2018-16722.json +++ b/2018/16xxx/CVE-2018-16722.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16722", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jingyun Antivirus v2.4.2.39, the driver file (ZySandbox.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x12360094, a related issue to CVE-2018-16305." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_12360094", + "refsource": "MISC", + "name": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_12360094" + }, + { + "refsource": "MISC", + "name": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19265", + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19265" } ] } diff --git a/2018/16xxx/CVE-2018-16723.json b/2018/16xxx/CVE-2018-16723.json index 140db2c0ec6..c362866e6b6 100644 --- a/2018/16xxx/CVE-2018-16723.json +++ b/2018/16xxx/CVE-2018-16723.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16723", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jingyun Antivirus v2.4.2.39, the driver file (ZySandbox.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x12364020." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_12364020", + "refsource": "MISC", + "name": "https://github.com/bsauce/poc/tree/master/jingyun_antivirus_12364020" + }, + { + "refsource": "MISC", + "name": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19264", + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2018-19264" } ] } diff --git a/2020/15xxx/CVE-2020-15436.json b/2020/15xxx/CVE-2020-15436.json index 15f0bede455..557f0a930c0 100644 --- a/2020/15xxx/CVE-2020-15436.json +++ b/2020/15xxx/CVE-2020-15436.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15436", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "securities@openeuler.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "linux kernel", + "version": { + "version_data": [ + { + "version_value": "5.7 (verified), possibly others 4.18" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://lkml.org/lkml/2020/6/7/379", + "url": "https://lkml.org/lkml/2020/6/7/379" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field." } ] } diff --git a/2020/15xxx/CVE-2020-15437.json b/2020/15xxx/CVE-2020-15437.json index 086d3dd407c..935ff4f0d77 100644 --- a/2020/15xxx/CVE-2020-15437.json +++ b/2020/15xxx/CVE-2020-15437.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15437", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "securities@openeuler.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "linux kernel", + "version": { + "version_data": [ + { + "version_value": "5.7 (verified), possibly others 4.18" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://lkml.org/lkml/2020/7/21/80", + "url": "https://lkml.org/lkml/2020/7/21/80" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized." } ] } diff --git a/2020/24xxx/CVE-2020-24227.json b/2020/24xxx/CVE-2020-24227.json index 8c88c3ab420..81ff97aaf79 100644 --- a/2020/24xxx/CVE-2020-24227.json +++ b/2020/24xxx/CVE-2020-24227.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24227", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24227", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Playground Sessions v2.5.582 (and earlier) for Windows, stores the user credentials in plain text allowing anyone with access to UserProfiles.sol to extract the email and password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/nathunandwani/CVE-2020-24227", + "url": "https://github.com/nathunandwani/CVE-2020-24227" } ] } diff --git a/2020/26xxx/CVE-2020-26231.json b/2020/26xxx/CVE-2020-26231.json index acbc4254f8f..a08ae837a6a 100644 --- a/2020/26xxx/CVE-2020-26231.json +++ b/2020/26xxx/CVE-2020-26231.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247.\n\nAn authenticated backend user with the cms.manage_pages, cms.manage_layouts, or cms.manage_partials permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to cms.enableSafeMode being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP.\n\nThis is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having cms.enableSafeMode enabled, but would be a problem for anyone relying on cms.enableSafeMode to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP.\n\nIssue has been patched in Build 470 (v1.0.470) and v1.1.1." + "value": "October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247. An authenticated backend user with the cms.manage_pages, cms.manage_layouts, or cms.manage_partials permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to cms.enableSafeMode being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having cms.enableSafeMode enabled, but would be a problem for anyone relying on cms.enableSafeMode to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. Issue has been patched in Build 470 (v1.0.470) and v1.1.1." } ] }, diff --git a/2020/28xxx/CVE-2020-28360.json b/2020/28xxx/CVE-2020-28360.json index efa60f53ba4..9375c1bb9c1 100644 --- a/2020/28xxx/CVE-2020-28360.json +++ b/2020/28xxx/CVE-2020-28360.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28360", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28360", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.npmjs.com/package/private-ip", + "refsource": "MISC", + "name": "https://www.npmjs.com/package/private-ip" + }, + { + "url": "https://github.com/frenchbread/private-ip", + "refsource": "MISC", + "name": "https://github.com/frenchbread/private-ip" } ] } diff --git a/2020/28xxx/CVE-2020-28421.json b/2020/28xxx/CVE-2020-28421.json index 91220661995..8b8698c1978 100644 --- a/2020/28xxx/CVE-2020-28421.json +++ b/2020/28xxx/CVE-2020-28421.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://support.broadcom.com/external/content/security-advisories/CA20201116-01-Security-Notice-for-CA-Unified-Infrastructure-Management/16565", "url": "https://support.broadcom.com/external/content/security-advisories/CA20201116-01-Security-Notice-for-CA-Unified-Infrastructure-Management/16565" + }, + { + "refsource": "FULLDISC", + "name": "20201123 CA20201116-01: Security Notice for CA Unified Infrastructure Management", + "url": "http://seclists.org/fulldisclosure/2020/Nov/41" } ] }, diff --git a/2020/28xxx/CVE-2020-28975.json b/2020/28xxx/CVE-2020-28975.json index 9715a91cc30..7e097a4aec9 100644 --- a/2020/28xxx/CVE-2020-28975.json +++ b/2020/28xxx/CVE-2020-28975.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "svm_predict_values in svm.cpp in Libsvm v324, as used in scikit-learn 0.23.2 and other products, allows attackers to cause a denial of service (segmentation fault) via a crafted model SVM (introduced via pickle, json, or any other model permanence standard) with a large value in the _n_support array." + "value": "** DISPUTED ** svm_predict_values in svm.cpp in Libsvm v324, as used in scikit-learn 0.23.2 and other products, allows attackers to cause a denial of service (segmentation fault) via a crafted model SVM (introduced via pickle, json, or any other model permanence standard) with a large value in the _n_support array. NOTE: the scikit-learn vendor's position is that the behavior can only occur if the library's API is violated by an application that changes a private attribute." } ] },