From 2b5d87d52d0730c61e76b3c2de9cee5e714b8748 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 10 Mar 2022 17:24:25 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14112.json | 50 +++++++++- 2021/3xxx/CVE-2021-3660.json | 60 +++++++++++- 2021/3xxx/CVE-2021-3732.json | 65 ++++++++++++- 2021/40xxx/CVE-2021-40011.json | 94 ++++++------------- 2021/40xxx/CVE-2021-40047.json | 116 +++++++++++++++++++++-- 2021/40xxx/CVE-2021-40048.json | 116 +++++++++++++++++++++-- 2021/40xxx/CVE-2021-40049.json | 104 +++++++++++++++++++-- 2021/40xxx/CVE-2021-40050.json | 108 +++++++++++++++++++-- 2021/40xxx/CVE-2021-40051.json | 108 +++++++++++++++++++-- 2021/40xxx/CVE-2021-40052.json | 72 ++++++++++++-- 2021/40xxx/CVE-2021-40053.json | 92 ++++++++++++++++-- 2021/40xxx/CVE-2021-40054.json | 100 ++++++++++++++++++-- 2021/40xxx/CVE-2021-40055.json | 116 +++++++++++++++++++++-- 2021/40xxx/CVE-2021-40376.json | 66 +++++++++++-- 2021/44xxx/CVE-2021-44032.json | 66 +++++++++++-- 2021/44xxx/CVE-2021-44215.json | 61 ++++++++++-- 2021/44xxx/CVE-2021-44216.json | 61 ++++++++++-- 2021/45xxx/CVE-2021-45844.json | 5 + 2022/0xxx/CVE-2022-0725.json | 50 +++++++++- 2022/0xxx/CVE-2022-0766.json | 166 ++++++++++++++++----------------- 2022/0xxx/CVE-2022-0878.json | 18 ++++ 2022/21xxx/CVE-2022-21209.json | 15 +++ 2022/23xxx/CVE-2022-23985.json | 30 ++++++ 2022/25xxx/CVE-2022-25108.json | 56 +++++++++-- 2022/25xxx/CVE-2022-25235.json | 5 + 2022/26xxx/CVE-2022-26527.json | 18 ++++ 2022/26xxx/CVE-2022-26528.json | 18 ++++ 2022/26xxx/CVE-2022-26529.json | 18 ++++ 2022/26xxx/CVE-2022-26530.json | 18 ++++ 2022/26xxx/CVE-2022-26531.json | 18 ++++ 2022/26xxx/CVE-2022-26532.json | 18 ++++ 2022/26xxx/CVE-2022-26533.json | 18 ++++ 2022/26xxx/CVE-2022-26534.json | 18 ++++ 2022/26xxx/CVE-2022-26535.json | 18 ++++ 2022/26xxx/CVE-2022-26536.json | 18 ++++ 2022/26xxx/CVE-2022-26537.json | 18 ++++ 2022/26xxx/CVE-2022-26538.json | 18 ++++ 2022/26xxx/CVE-2022-26539.json | 18 ++++ 2022/26xxx/CVE-2022-26540.json | 18 ++++ 2022/26xxx/CVE-2022-26541.json | 18 ++++ 2022/26xxx/CVE-2022-26542.json | 18 ++++ 2022/26xxx/CVE-2022-26543.json | 18 ++++ 2022/26xxx/CVE-2022-26544.json | 18 ++++ 2022/26xxx/CVE-2022-26545.json | 18 ++++ 2022/26xxx/CVE-2022-26546.json | 18 ++++ 2022/26xxx/CVE-2022-26547.json | 18 ++++ 2022/26xxx/CVE-2022-26548.json | 18 ++++ 2022/26xxx/CVE-2022-26549.json | 18 ++++ 2022/26xxx/CVE-2022-26550.json | 18 ++++ 2022/26xxx/CVE-2022-26551.json | 18 ++++ 2022/26xxx/CVE-2022-26552.json | 18 ++++ 2022/26xxx/CVE-2022-26553.json | 18 ++++ 2022/26xxx/CVE-2022-26554.json | 18 ++++ 2022/26xxx/CVE-2022-26555.json | 18 ++++ 2022/26xxx/CVE-2022-26556.json | 18 ++++ 2022/26xxx/CVE-2022-26557.json | 18 ++++ 2022/26xxx/CVE-2022-26558.json | 18 ++++ 2022/26xxx/CVE-2022-26559.json | 18 ++++ 2022/26xxx/CVE-2022-26560.json | 18 ++++ 2022/26xxx/CVE-2022-26561.json | 18 ++++ 2022/26xxx/CVE-2022-26562.json | 18 ++++ 2022/26xxx/CVE-2022-26563.json | 18 ++++ 2022/26xxx/CVE-2022-26564.json | 18 ++++ 2022/26xxx/CVE-2022-26565.json | 18 ++++ 2022/26xxx/CVE-2022-26566.json | 18 ++++ 65 files changed, 2278 insertions(+), 242 deletions(-) create mode 100644 2022/0xxx/CVE-2022-0878.json create mode 100644 2022/26xxx/CVE-2022-26527.json create mode 100644 2022/26xxx/CVE-2022-26528.json create mode 100644 2022/26xxx/CVE-2022-26529.json create mode 100644 2022/26xxx/CVE-2022-26530.json create mode 100644 2022/26xxx/CVE-2022-26531.json create mode 100644 2022/26xxx/CVE-2022-26532.json create mode 100644 2022/26xxx/CVE-2022-26533.json create mode 100644 2022/26xxx/CVE-2022-26534.json create mode 100644 2022/26xxx/CVE-2022-26535.json create mode 100644 2022/26xxx/CVE-2022-26536.json create mode 100644 2022/26xxx/CVE-2022-26537.json create mode 100644 2022/26xxx/CVE-2022-26538.json create mode 100644 2022/26xxx/CVE-2022-26539.json create mode 100644 2022/26xxx/CVE-2022-26540.json create mode 100644 2022/26xxx/CVE-2022-26541.json create mode 100644 2022/26xxx/CVE-2022-26542.json create mode 100644 2022/26xxx/CVE-2022-26543.json create mode 100644 2022/26xxx/CVE-2022-26544.json create mode 100644 2022/26xxx/CVE-2022-26545.json create mode 100644 2022/26xxx/CVE-2022-26546.json create mode 100644 2022/26xxx/CVE-2022-26547.json create mode 100644 2022/26xxx/CVE-2022-26548.json create mode 100644 2022/26xxx/CVE-2022-26549.json create mode 100644 2022/26xxx/CVE-2022-26550.json create mode 100644 2022/26xxx/CVE-2022-26551.json create mode 100644 2022/26xxx/CVE-2022-26552.json create mode 100644 2022/26xxx/CVE-2022-26553.json create mode 100644 2022/26xxx/CVE-2022-26554.json create mode 100644 2022/26xxx/CVE-2022-26555.json create mode 100644 2022/26xxx/CVE-2022-26556.json create mode 100644 2022/26xxx/CVE-2022-26557.json create mode 100644 2022/26xxx/CVE-2022-26558.json create mode 100644 2022/26xxx/CVE-2022-26559.json create mode 100644 2022/26xxx/CVE-2022-26560.json create mode 100644 2022/26xxx/CVE-2022-26561.json create mode 100644 2022/26xxx/CVE-2022-26562.json create mode 100644 2022/26xxx/CVE-2022-26563.json create mode 100644 2022/26xxx/CVE-2022-26564.json create mode 100644 2022/26xxx/CVE-2022-26565.json create mode 100644 2022/26xxx/CVE-2022-26566.json diff --git a/2020/14xxx/CVE-2020-14112.json b/2020/14xxx/CVE-2020-14112.json index f9372bad637..12fffcd8dc2 100644 --- a/2020/14xxx/CVE-2020-14112.json +++ b/2020/14xxx/CVE-2020-14112.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-14112", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@xiaomi.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Router AX6000", + "version": { + "version_data": [ + { + "version_value": "Router AX6000 version <1.0.56" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Leak" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=34", + "url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=34" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Information Leak Vulnerability exists in the Xiaomi Router AX6000. The vulnerability is caused by incorrect routing configuration. Attackers can exploit this vulnerability to download part of the files in Xiaomi Router AX6000." } ] } diff --git a/2021/3xxx/CVE-2021-3660.json b/2021/3xxx/CVE-2021-3660.json index df9d633238e..74d766614d1 100644 --- a/2021/3xxx/CVE-2021-3660.json +++ b/2021/3xxx/CVE-2021-3660.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3660", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "cockpit", + "version": { + "version_data": [ + { + "version_value": "Fixed in cockpit v254 and later." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1021 - Improper Restriction of Rendered UI Layers or Frames" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688" + }, + { + "refsource": "MISC", + "name": "https://github.com/cockpit-project/cockpit/issues/16122", + "url": "https://github.com/cockpit-project/cockpit/issues/16122" + }, + { + "refsource": "MISC", + "name": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10", + "url": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an