diff --git a/2018/5xxx/CVE-2018-5493.json b/2018/5xxx/CVE-2018-5493.json index c5fef662977..47b14463e4a 100644 --- a/2018/5xxx/CVE-2018-5493.json +++ b/2018/5xxx/CVE-2018-5493.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-5493", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-5493", + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ATTO FibreBridge 7500N", + "version": { + "version_data": [ + { + "version_value": "Versions prior to 2.90" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20200507-0001/", + "url": "https://security.netapp.com/advisory/ntap-20200507-0001/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ATTO FibreBridge 7500N firmware versions prior to 2.90 are susceptible to a vulnerability which allows an unauthenticated remote attacker to cause Denial of Service (DoS)." } ] } diff --git a/2019/10xxx/CVE-2019-10072.json b/2019/10xxx/CVE-2019-10072.json index 310fd281c87..92b9e51cf39 100644 --- a/2019/10xxx/CVE-2019-10072.json +++ b/2019/10xxx/CVE-2019-10072.json @@ -128,6 +128,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4680", + "url": "https://www.debian.org/security/2020/dsa-4680" } ] }, diff --git a/2019/12xxx/CVE-2019-12418.json b/2019/12xxx/CVE-2019-12418.json index 4849d3e2a2f..9d9c53f3b40 100644 --- a/2019/12xxx/CVE-2019-12418.json +++ b/2019/12xxx/CVE-2019-12418.json @@ -129,6 +129,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4680", + "url": "https://www.debian.org/security/2020/dsa-4680" } ] }, diff --git a/2019/17xxx/CVE-2019-17563.json b/2019/17xxx/CVE-2019-17563.json index 4d45beb8bbc..a22fd5e6b69 100644 --- a/2019/17xxx/CVE-2019-17563.json +++ b/2019/17xxx/CVE-2019-17563.json @@ -119,6 +119,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4680", + "url": "https://www.debian.org/security/2020/dsa-4680" } ] }, diff --git a/2019/17xxx/CVE-2019-17569.json b/2019/17xxx/CVE-2019-17569.json index 9328a439421..1472947220b 100644 --- a/2019/17xxx/CVE-2019-17569.json +++ b/2019/17xxx/CVE-2019-17569.json @@ -84,6 +84,11 @@ "refsource": "DEBIAN", "name": "DSA-4673", "url": "https://www.debian.org/security/2020/dsa-4673" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4680", + "url": "https://www.debian.org/security/2020/dsa-4680" } ] }, diff --git a/2019/18xxx/CVE-2019-18865.json b/2019/18xxx/CVE-2019-18865.json new file mode 100644 index 00000000000..36179eec2f2 --- /dev/null +++ b/2019/18xxx/CVE-2019-18865.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18865", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Information disclosure via error message discrepancies in authentication functions in Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to enumerate valid usernames." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lodestonesecurity.com", + "refsource": "MISC", + "name": "https://lodestonesecurity.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md", + "url": "https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18867.json b/2019/18xxx/CVE-2019-18867.json new file mode 100644 index 00000000000..a6958eb27e1 --- /dev/null +++ b/2019/18xxx/CVE-2019-18867.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18867", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Browsable directories in Blaauw Remote Kiln Control through v3.00r4 allow an attacker to enumerate sensitive filenames and locations, including source code. This affects /ajax/, /common/, /engine/, /flash/, /images/, /Images/, /jscripts/, /lang/, /layout/, /programs/, and /sms/." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md", + "url": "https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18868.json b/2019/18xxx/CVE-2019-18868.json new file mode 100644 index 00000000000..4099080bcb9 --- /dev/null +++ b/2019/18xxx/CVE-2019-18868.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18868", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to access MySQL credentials in cleartext in /engine/db.inc, /lang/nl.bak, or /lang/en.bak." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lodestonesecurity.com", + "refsource": "MISC", + "name": "https://lodestonesecurity.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md", + "url": "https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md" + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12697.json b/2020/12xxx/CVE-2020-12697.json new file mode 100644 index 00000000000..393f574eb17 --- /dev/null +++ b/2020/12xxx/CVE-2020-12697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12698.json b/2020/12xxx/CVE-2020-12698.json new file mode 100644 index 00000000000..542bbd62340 --- /dev/null +++ b/2020/12xxx/CVE-2020-12698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12699.json b/2020/12xxx/CVE-2020-12699.json new file mode 100644 index 00000000000..0f1334c8734 --- /dev/null +++ b/2020/12xxx/CVE-2020-12699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12700.json b/2020/12xxx/CVE-2020-12700.json new file mode 100644 index 00000000000..591a1f6daef --- /dev/null +++ b/2020/12xxx/CVE-2020-12700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/1xxx/CVE-2020-1935.json b/2020/1xxx/CVE-2020-1935.json index b2ef78e142f..b1baf7efb1c 100644 --- a/2020/1xxx/CVE-2020-1935.json +++ b/2020/1xxx/CVE-2020-1935.json @@ -84,6 +84,11 @@ "refsource": "DEBIAN", "name": "DSA-4673", "url": "https://www.debian.org/security/2020/dsa-4673" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4680", + "url": "https://www.debian.org/security/2020/dsa-4680" } ] }, diff --git a/2020/1xxx/CVE-2020-1938.json b/2020/1xxx/CVE-2020-1938.json index eac86608275..ea8725b0c53 100644 --- a/2020/1xxx/CVE-2020-1938.json +++ b/2020/1xxx/CVE-2020-1938.json @@ -234,6 +234,11 @@ "refsource": "DEBIAN", "name": "DSA-4673", "url": "https://www.debian.org/security/2020/dsa-4673" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4680", + "url": "https://www.debian.org/security/2020/dsa-4680" } ] }, diff --git a/2020/5xxx/CVE-2020-5894.json b/2020/5xxx/CVE-2020-5894.json index d4c07fc9a62..bd07d4831eb 100644 --- a/2020/5xxx/CVE-2020-5894.json +++ b/2020/5xxx/CVE-2020-5894.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5894", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NGINX Controller", + "version": { + "version_data": [ + { + "version_value": "< 3.4.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Session Hijacking" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.f5.com/csp/article/K13028514", + "url": "https://support.f5.com/csp/article/K13028514" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out." } ] } diff --git a/2020/5xxx/CVE-2020-5895.json b/2020/5xxx/CVE-2020-5895.json index de4996911b0..fa485e496a2 100644 --- a/2020/5xxx/CVE-2020-5895.json +++ b/2020/5xxx/CVE-2020-5895.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5895", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "f5sirt@f5.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NGINX Controller", + "version": { + "version_data": [ + { + "version_value": "< 3.4.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "DoS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.f5.com/csp/article/K95120415", + "url": "https://support.f5.com/csp/article/K95120415" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "On NGINX Controller versions 3.1.0-3.3.0, AVRD uses world-readable and world-writable permissions on its socket, which allows processes or users on the local system to write arbitrary data into the socket. A local system attacker can make AVRD segmentation fault (SIGSEGV) by writing malformed messages to the socket." } ] } diff --git a/2020/6xxx/CVE-2020-6081.json b/2020/6xxx/CVE-2020-6081.json index caca8506944..4d9f9e350fd 100644 --- a/2020/6xxx/CVE-2020-6081.json +++ b/2020/6xxx/CVE-2020-6081.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6081", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "3S", + "version": { + "version_data": [ + { + "version_value": "3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1003", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1003" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. A specially crafted network request can cause remote code execution. An attacker can send a malicious packet to trigger this vulnerability." } ] }