diff --git a/2013/0xxx/CVE-2013-0340.json b/2013/0xxx/CVE-2013-0340.json index 2967929d41a..f52c5d84152 100644 --- a/2013/0xxx/CVE-2013-0340.json +++ b/2013/0xxx/CVE-2013-0340.json @@ -141,6 +141,21 @@ "refsource": "FULLDISC", "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "url": "http://seclists.org/fulldisclosure/2021/Sep/39" + }, + { + "refsource": "MLIST", + "name": "[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", + "url": "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", + "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/4" } ] } diff --git a/2014/2xxx/CVE-2014-2815.json b/2014/2xxx/CVE-2014-2815.json index 4d627183e55..42109a565a0 100644 --- a/2014/2xxx/CVE-2014-2815.json +++ b/2014/2xxx/CVE-2014-2815.json @@ -76,6 +76,11 @@ "name": "69098", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69098" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164419/Microsoft-Office-OneNote-2007-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/164419/Microsoft-Office-OneNote-2007-Remote-Code-Execution.html" } ] } diff --git a/2014/3xxx/CVE-2014-3577.json b/2014/3xxx/CVE-2014-3577.json index 7065aaba8e2..28826ebb34d 100644 --- a/2014/3xxx/CVE-2014-3577.json +++ b/2014/3xxx/CVE-2014-3577.json @@ -276,6 +276,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211006 Multiple vulnerabilities in Jenkins and Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/10/06/1" } ] } diff --git a/2017/12xxx/CVE-2017-12678.json b/2017/12xxx/CVE-2017-12678.json index 46de2b7d1a4..ba75fd4833f 100644 --- a/2017/12xxx/CVE-2017-12678.json +++ b/2017/12xxx/CVE-2017-12678.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://github.com/taglib/taglib/commit/cb9f07d9dcd791b63e622da43f7b232adaec0a9a", "url": "https://github.com/taglib/taglib/commit/cb9f07d9dcd791b63e622da43f7b232adaec0a9a" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2772-1] taglib security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00020.html" } ] } diff --git a/2017/18xxx/CVE-2017-18640.json b/2017/18xxx/CVE-2017-18640.json index 1fd3ba59744..7a7a716f9cc 100644 --- a/2017/18xxx/CVE-2017-18640.json +++ b/2017/18xxx/CVE-2017-18640.json @@ -306,6 +306,31 @@ "refsource": "MLIST", "name": "[kafka-users] 20210617 vulnerabilities", "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-common-issues] 20211006 [jira] [Commented] (HADOOP-17236) Bump up snakeyaml to 1.26 to mitigate CVE-2017-18640", + "url": "https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-common-commits] 20211008 [hadoop] branch branch-3.2.3 updated: HADOOP-17236. Bump up snakeyaml to 1.26 to mitigate CVE-2017-18640. Contributed by Brahma Reddy Battula.", + "url": "https://lists.apache.org/thread.html/rfe0aab6c3bebbd9cbfdedb65ff3fdf420714bcb8acdfd346077e1263@%3Ccommon-commits.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-common-issues] 20211008 [jira] [Updated] (HADOOP-17236) Bump up snakeyaml to 1.26 to mitigate CVE-2017-18640", + "url": "https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-common-commits] 20211008 [hadoop] branch branch-3.2 updated: HADOOP-17236. Bump up snakeyaml to 1.26 to mitigate CVE-2017-18640. Contributed by Brahma Reddy Battula.", + "url": "https://lists.apache.org/thread.html/rdd34c0479587e32a656d976649409487d51ca0d296b3e26b6b89c3f5@%3Ccommon-commits.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-common-issues] 20211008 [jira] [Commented] (HADOOP-17236) Bump up snakeyaml to 1.26 to mitigate CVE-2017-18640", + "url": "https://lists.apache.org/thread.html/r465d2553a31265b042cf5457ef649b71e0722ab89b6ea94a5d59529b@%3Ccommon-issues.hadoop.apache.org%3E" } ] } diff --git a/2018/11xxx/CVE-2018-11439.json b/2018/11xxx/CVE-2018-11439.json index abca965f089..c4c9c7986a6 100644 --- a/2018/11xxx/CVE-2018-11439.json +++ b/2018/11xxx/CVE-2018-11439.json @@ -61,6 +61,11 @@ "name": "20180528 taglib 1.11.1 vuln", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/May/49" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2772-1] taglib security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00020.html" } ] } diff --git a/2018/16xxx/CVE-2018-16871.json b/2018/16xxx/CVE-2018-16871.json index 42d6de35b07..0daacf2c863 100644 --- a/2018/16xxx/CVE-2018-16871.json +++ b/2018/16xxx/CVE-2018-16871.json @@ -73,6 +73,11 @@ "refsource": "REDHAT", "name": "RHSA-2020:0740", "url": "https://access.redhat.com/errata/RHSA-2020:0740" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211004-0002/", + "url": "https://security.netapp.com/advisory/ntap-20211004-0002/" } ] }, diff --git a/2018/1xxx/CVE-2018-1288.json b/2018/1xxx/CVE-2018-1288.json index b97d8d6dacd..633af935592 100644 --- a/2018/1xxx/CVE-2018-1288.json +++ b/2018/1xxx/CVE-2018-1288.json @@ -106,6 +106,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2020.html" + }, + { + "refsource": "MLIST", + "name": "[kafka-dev] 20211007 Re: CVE Back Port?", + "url": "https://lists.apache.org/thread.html/r35322aec467ddae34002690edaa4d9f16e7df9b5bf7164869b75b62c@%3Cdev.kafka.apache.org%3E" } ] } diff --git a/2018/1xxx/CVE-2018-1313.json b/2018/1xxx/CVE-2018-1313.json index cf6b22fee09..086011e76e0 100644 --- a/2018/1xxx/CVE-2018-1313.json +++ b/2018/1xxx/CVE-2018-1313.json @@ -77,6 +77,26 @@ "refsource": "MLIST", "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", + "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-dev] 20211007 [jira] [Created] (HIVE-25597) Bump Apache Derby 10.14.1.0 to 10.14.2.0 CVE-2018-1313", + "url": "https://lists.apache.org/thread.html/re29ab90978e6c997377fb975f674f7514f6beb642bbf79deb45477e5@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20211007 [jira] [Assigned] (HIVE-25597) Bump Apache Derby 10.14.1.0 to 10.14.2.0 CVE-2018-1313", + "url": "https://lists.apache.org/thread.html/r437d94437e6aef31af689b1e7025d024d676fd1ea9901d74e3e9ae48@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20211007 [jira] [Commented] (HIVE-25597) Bump Apache Derby 10.14.1.0 to 10.14.2.0 CVE-2018-1313", + "url": "https://lists.apache.org/thread.html/r6755f48d4f5e44e39bba7dbf8d746678239d7f1f2cc108125519ce53@%3Cissues.hive.apache.org%3E" } ] } diff --git a/2018/20xxx/CVE-2018-20217.json b/2018/20xxx/CVE-2018-20217.json index 251a76be5c1..86906da4117 100644 --- a/2018/20xxx/CVE-2018-20217.json +++ b/2018/20xxx/CVE-2018-20217.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20190416-0006/", "url": "https://security.netapp.com/advisory/ntap-20190416-0006/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" } ] } diff --git a/2018/5xxx/CVE-2018-5729.json b/2018/5xxx/CVE-2018-5729.json index 854fdb9db6b..162ac441aa3 100644 --- a/2018/5xxx/CVE-2018-5729.json +++ b/2018/5xxx/CVE-2018-5729.json @@ -96,6 +96,11 @@ "refsource": "REDHAT", "name": "RHBA-2019:0327", "url": "https://access.redhat.com/errata/RHBA-2019:0327" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" } ] } diff --git a/2018/5xxx/CVE-2018-5730.json b/2018/5xxx/CVE-2018-5730.json index 76006317053..7b89a848b07 100644 --- a/2018/5xxx/CVE-2018-5730.json +++ b/2018/5xxx/CVE-2018-5730.json @@ -96,6 +96,11 @@ "refsource": "REDHAT", "name": "RHBA-2019:0327", "url": "https://access.redhat.com/errata/RHBA-2019:0327" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" } ] } diff --git a/2019/0xxx/CVE-2019-0205.json b/2019/0xxx/CVE-2019-0205.json index efd3425ec5d..757e2ab0171 100644 --- a/2019/0xxx/CVE-2019-0205.json +++ b/2019/0xxx/CVE-2019-0205.json @@ -238,6 +238,21 @@ "refsource": "MLIST", "name": "[cassandra-commits] 20210924 [jira] [Updated] (CASSANDRA-15420) CVE-2019-0205(Apache Thrift all versions up to and including 0.12.0) on version Cassendra 3.11.4", "url": "https://lists.apache.org/thread.html/r934f312dd5add7276ac2de684d8b237554ff9f34479a812df5fd6aee@%3Ccommits.cassandra.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cassandra-user] 20211004 Vulnerability in libthrift library (CVE-2019-0205)", + "url": "https://lists.apache.org/thread.html/r7859e767c90c8f4971dec50f801372aa64e88f143c3e8a265a36f9b4@%3Cuser.cassandra.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cassandra-user] 20211004 Re: Vulnerability in libthrift library (CVE-2019-0205)", + "url": "https://lists.apache.org/thread.html/r92b7771afee2625209c36727fefdc77033964e9a1daa81ec3327e625@%3Cuser.cassandra.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cassandra-user] 20211005 Re: Vulnerability in libthrift library (CVE-2019-0205)", + "url": "https://lists.apache.org/thread.html/r53c03e1c979b9c628d0d65e0f49dd9a9f9d7572838727ad11b750575@%3Cuser.cassandra.apache.org%3E" } ] }, diff --git a/2019/17xxx/CVE-2019-17571.json b/2019/17xxx/CVE-2019-17571.json index 3f8d68b49d4..432a8a65f0c 100644 --- a/2019/17xxx/CVE-2019-17571.json +++ b/2019/17xxx/CVE-2019-17571.json @@ -533,6 +533,41 @@ "refsource": "MLIST", "name": "[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-common-issues] 20211006 [jira] [Commented] (HADOOP-17221) update log4j-1.2.17 to atlassian version( To Address: CVE-2019-17571)", + "url": "https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9@%3Ccommon-issues.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bookkeeper-issues] 20211006 [GitHub] [bookkeeper] RaulGracia opened a new issue #2815: Upgrade to log4j2 to get rid of CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bookkeeper-issues] 20211006 [GitHub] [bookkeeper] RaulGracia opened a new pull request #2816: Issue 2815: Upgrade to log4j2 to get rid of CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bookkeeper-issues] 20211006 [GitHub] [bookkeeper] eolivelli commented on a change in pull request #2816: Issue 2815: Upgrade to log4j2 to get rid of CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bookkeeper-issues] 20211007 [GitHub] [bookkeeper] RaulGracia commented on pull request #2816: Issue 2815: Upgrade to log4j2 to get rid of CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bookkeeper-issues] 20211007 [GitHub] [bookkeeper] RaulGracia commented on a change in pull request #2816: Issue 2815: Upgrade to log4j2 to get rid of CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bookkeeper-issues] 20211007 [GitHub] [bookkeeper] eolivelli commented on a change in pull request #2816: Issue 2815: Upgrade to log4j2 to get rid of CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0@%3Cissues.bookkeeper.apache.org%3E" } ] }, diff --git a/2019/19xxx/CVE-2019-19797.json b/2019/19xxx/CVE-2019-19797.json index 7e462f0d529..34d4ef1b4f6 100644 --- a/2019/19xxx/CVE-2019-19797.json +++ b/2019/19xxx/CVE-2019-19797.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-5d0f0593ae", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7XOY5NXUZ6JRBBPYA3CXWGRGQTSDVVG2/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 6d6e33a0ca2..69d96f950cc 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -573,6 +573,11 @@ "refsource": "MLIST", "name": "[thrift-user] 20210927 Analysis and guidelines concerning CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r6ae3c68b0bfe430fb32f24236475276b6302bed625b23f53b68748b5@%3Cuser.thrift.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[thrift-user] 20211004 Re: Analysis and guidelines concerning CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E" } ] }, diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index c396258acdf..16c5ebbe751 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -293,6 +293,11 @@ "refsource": "MLIST", "name": "[lucene-issues] 20210921 [GitHub] [lucene-solr] ventry1990 commented on pull request #2579: SOLR-15269: Upgrade Apache HttpComponents Client to 4.5.13 to fix CVE-2020-13956", "url": "https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[lucene-issues] 20211007 [GitHub] [lucene-solr] madrob commented on pull request #2579: SOLR-15269: Upgrade Apache HttpComponents Client to 4.5.13 to fix CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E" } ] }, diff --git a/2020/15xxx/CVE-2020-15250.json b/2020/15xxx/CVE-2020-15250.json index 7c1fe1c1e39..3e6eb2ebede 100644 --- a/2020/15xxx/CVE-2020-15250.json +++ b/2020/15xxx/CVE-2020-15250.json @@ -213,6 +213,51 @@ "refsource": "MLIST", "name": "[portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-790) Upgrade to JUnit 4.13.1 due to CVE-2020-15250", "url": "https://lists.apache.org/thread.html/r09cfbb5aedd76023691bbce9ca4ce2e16bb07dd37554a17efc19935d@%3Cpluto-dev.portals.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211004 [jira] [Created] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/r2b78f23bc2711a76a7fc73ad67b7fcd6817c5cfccefd6f30a4f54943@%3Cdev.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211004 [GitHub] [knox] zeroflag opened a new pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/rf6e5d894d4b03bef537c9d6641272e0197c047c0d1982b4e176d0353@%3Cdev.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211004 [jira] [Work logged] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/r687f489b10b0d14e46f626aa88476545e1a2600b24c4ebd3c0d2a10b@%3Cdev.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211004 [GitHub] [knox] zeroflag commented on pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/r934208a520b38f5cf0cae199b6b076bfe7d081809528b0eff2459e40@%3Cdev.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211008 [jira] [Commented] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/r8b02dc6f18df11ff39eedb3038f1e31e6f90a779b1959bae65107279@%3Cdev.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-commits] 20211008 [knox] branch master updated: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250 (#505)", + "url": "https://lists.apache.org/thread.html/r9710067c7096b83cb6ae8f53a2f6f94e9c042d1bf1d6929f8f2a2b7a@%3Ccommits.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211008 [jira] [Resolved] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/r1209986f79359b518d09513ff05a88e5b3c398540e775edea76a4774@%3Cdev.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211008 [jira] [Work logged] (KNOX-2674) Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/r742b44fd75215fc75963b8ecc22b2e4372e68d67d3d859d2b5e8743f@%3Cdev.knox.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[knox-dev] 20211008 [GitHub] [knox] smolnar82 merged pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250", + "url": "https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E" } ] }, diff --git a/2020/15xxx/CVE-2020-15941.json b/2020/15xxx/CVE-2020-15941.json index b4bbe8696b8..189bec4b1ce 100644 --- a/2020/15xxx/CVE-2020-15941.json +++ b/2020/15xxx/CVE-2020-15941.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15941", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiClientEMS", + "version": { + "version_data": [ + { + "version_value": "FortiClientEMS 6.4.1, 6.4.0, 6.2.8, 6.2.7, 6.2.6, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "Low", + "baseScore": 5.3, + "baseSeverity": "Medium", + "confidentialityImpact": "None", + "integrityImpact": "Low", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:F/RL:X/RC:X", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-074", + "url": "https://fortiguard.com/advisory/FG-IR-20-074" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages." } ] } diff --git a/2020/19xxx/CVE-2020-19003.json b/2020/19xxx/CVE-2020-19003.json index f67eb1513e1..cd0aa916d1b 100644 --- a/2020/19xxx/CVE-2020-19003.json +++ b/2020/19xxx/CVE-2020-19003.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-19003", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-19003", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/liftoff/GateOne/issues/728", + "refsource": "MISC", + "name": "https://github.com/liftoff/GateOne/issues/728" } ] } diff --git a/2020/19xxx/CVE-2020-19143.json b/2020/19xxx/CVE-2020-19143.json index affa6b5227f..47ac4e068e5 100644 --- a/2020/19xxx/CVE-2020-19143.json +++ b/2020/19xxx/CVE-2020-19143.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/119", "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/119" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211004-0005/", + "url": "https://security.netapp.com/advisory/ntap-20211004-0005/" } ] } diff --git a/2020/19xxx/CVE-2020-19144.json b/2020/19xxx/CVE-2020-19144.json index 53409f41931..db10eb65e26 100644 --- a/2020/19xxx/CVE-2020-19144.json +++ b/2020/19xxx/CVE-2020-19144.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://gitlab.com/libtiff/libtiff/-/issues/159", "url": "https://gitlab.com/libtiff/libtiff/-/issues/159" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211004-0005/", + "url": "https://security.netapp.com/advisory/ntap-20211004-0005/" } ] } diff --git a/2020/1xxx/CVE-2020-1416.json b/2020/1xxx/CVE-2020-1416.json index abafb16f35a..d975a480562 100644 --- a/2020/1xxx/CVE-2020-1416.json +++ b/2020/1xxx/CVE-2020-1416.json @@ -116,11 +116,6 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1416", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1416" - }, - { - "refsource": "CISCO", - "name": "20210217 Cisco Identity Services Engine Sensitive Information Disclosure Vulnerabilities", - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-exp-8RsuEu8S" } ] } diff --git a/2020/20xxx/CVE-2020-20662.json b/2020/20xxx/CVE-2020-20662.json index 3892555e504..266854af33c 100644 --- a/2020/20xxx/CVE-2020-20662.json +++ b/2020/20xxx/CVE-2020-20662.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20662", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20662", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_example1.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/6", + "refsource": "MISC", + "name": "https://github.com/fcovatti/libiec_iccp_mod/issues/6" } ] } diff --git a/2020/20xxx/CVE-2020-20663.json b/2020/20xxx/CVE-2020-20663.json index 9ed4baea802..0de23df990c 100644 --- a/2020/20xxx/CVE-2020-20663.json +++ b/2020/20xxx/CVE-2020-20663.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20663", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20663", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_connection.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/7", + "refsource": "MISC", + "name": "https://github.com/fcovatti/libiec_iccp_mod/issues/7" } ] } diff --git a/2020/20xxx/CVE-2020-20664.json b/2020/20xxx/CVE-2020-20664.json index 1b1d8b4b8b7..0a331656a39 100644 --- a/2020/20xxx/CVE-2020-20664.json +++ b/2020/20xxx/CVE-2020-20664.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20664", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20664", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "libiec_iccp_mod v1.5 contains a segmentation violation in the component server_example1.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/8", + "refsource": "MISC", + "name": "https://github.com/fcovatti/libiec_iccp_mod/issues/8" } ] } diff --git a/2020/20xxx/CVE-2020-20665.json b/2020/20xxx/CVE-2020-20665.json index 516c1eeb93f..a194d0340b6 100644 --- a/2020/20xxx/CVE-2020-20665.json +++ b/2020/20xxx/CVE-2020-20665.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20665", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20665", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "rudp v0.6 was discovered to contain a memory leak in the component main.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cloudwu/rudp/issues/6", + "refsource": "MISC", + "name": "https://github.com/cloudwu/rudp/issues/6" } ] } diff --git a/2020/20xxx/CVE-2020-20746.json b/2020/20xxx/CVE-2020-20746.json index 2d43d696ba0..5bea8cd1364 100644 --- a/2020/20xxx/CVE-2020-20746.json +++ b/2020/20xxx/CVE-2020-20746.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20746", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20746", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/grapefruitvul/vulinfo/blob/master/tenda/vul1.md", + "refsource": "MISC", + "name": "https://github.com/grapefruitvul/vulinfo/blob/master/tenda/vul1.md" } ] } diff --git a/2020/20xxx/CVE-2020-20796.json b/2020/20xxx/CVE-2020-20796.json index 2155b53b1a5..7cd4071107d 100644 --- a/2020/20xxx/CVE-2020-20796.json +++ b/2020/20xxx/CVE-2020-20796.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20796", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20796", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FlameCMS 3.3.5 contains a SQL injection vulnerability in /master/article.php via the \"Id\" parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/FlameNET/FlameCMS/issues/24", + "refsource": "MISC", + "name": "https://github.com/FlameNET/FlameCMS/issues/24" } ] } diff --git a/2020/20xxx/CVE-2020-20797.json b/2020/20xxx/CVE-2020-20797.json index fb32dcaabc3..4b6c2f355f3 100644 --- a/2020/20xxx/CVE-2020-20797.json +++ b/2020/20xxx/CVE-2020-20797.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20797", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20797", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FlameCMS 3.3.5 contains a time-based blind SQL injection vulnerability in /account/register.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/FlameNET/FlameCMS/issues/26", + "refsource": "MISC", + "name": "https://github.com/FlameNET/FlameCMS/issues/26" } ] } diff --git a/2020/20xxx/CVE-2020-20799.json b/2020/20xxx/CVE-2020-20799.json index 9f5692ae6a7..3ca97c19b30 100644 --- a/2020/20xxx/CVE-2020-20799.json +++ b/2020/20xxx/CVE-2020-20799.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20799", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20799", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "JeeCMS 1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the commentText parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/blackjliuyun/cvetest/issues/1", + "refsource": "MISC", + "name": "https://github.com/blackjliuyun/cvetest/issues/1" } ] } diff --git a/2020/21xxx/CVE-2020-21012.json b/2020/21xxx/CVE-2020-21012.json index 13bd0c8d92b..e21a24434bf 100644 --- a/2020/21xxx/CVE-2020-21012.json +++ b/2020/21xxx/CVE-2020-21012.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21012", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21012", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sourcecodester Hotel and Lodge Management System 2.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the email parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/hitIer/web_test/tree/master/hotel", + "refsource": "MISC", + "name": "https://github.com/hitIer/web_test/tree/master/hotel" } ] } diff --git a/2020/21xxx/CVE-2020-21013.json b/2020/21xxx/CVE-2020-21013.json index 00d69b1f7d7..c6362535c6f 100644 --- a/2020/21xxx/CVE-2020-21013.json +++ b/2020/21xxx/CVE-2020-21013.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21013", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21013", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "emlog v6.0.0 contains a SQL injection via /admin/comment.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emlog/emlog/issues/52", + "refsource": "MISC", + "name": "https://github.com/emlog/emlog/issues/52" } ] } diff --git a/2020/21xxx/CVE-2020-21014.json b/2020/21xxx/CVE-2020-21014.json index 4a6e13e349c..a602dbdb770 100644 --- a/2020/21xxx/CVE-2020-21014.json +++ b/2020/21xxx/CVE-2020-21014.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21014", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21014", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "emlog v6.0.0 contains an arbitrary file deletion vulnerability in admin/plugin.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emlog/emlog/issues/53", + "refsource": "MISC", + "name": "https://github.com/emlog/emlog/issues/53" } ] } diff --git a/2020/21xxx/CVE-2020-21228.json b/2020/21xxx/CVE-2020-21228.json index 73531e8ffc8..f867f1fae91 100644 --- a/2020/21xxx/CVE-2020-21228.json +++ b/2020/21xxx/CVE-2020-21228.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21228", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21228", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "JIZHICMS 1.5.1 contains a cross-site scripting (XSS) vulnerability in the component /user/release.html, which allows attackers to arbitrarily add an administrator cookie." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Cherry-toto/jizhicms", + "refsource": "MISC", + "name": "https://github.com/Cherry-toto/jizhicms" + }, + { + "url": "http://jizhicms.com", + "refsource": "MISC", + "name": "http://jizhicms.com" + }, + { + "url": "https://github.com/Cherry-toto/jizhicms/issues/16", + "refsource": "MISC", + "name": "https://github.com/Cherry-toto/jizhicms/issues/16" } ] } diff --git a/2020/21xxx/CVE-2020-21386.json b/2020/21xxx/CVE-2020-21386.json index e133415821a..e41979c5afe 100644 --- a/2020/21xxx/CVE-2020-21386.json +++ b/2020/21xxx/CVE-2020-21386.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21386", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21386", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Request Forgery (CSRF) in the component admin.php/admin/type/info.html of Maccms 10 allows attackers to gain administrator privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/magicblack/maccms10/issues/126", + "refsource": "MISC", + "name": "https://github.com/magicblack/maccms10/issues/126" } ] } diff --git a/2020/21xxx/CVE-2020-21387.json b/2020/21xxx/CVE-2020-21387.json index 69469ee60c8..5d719fa79e9 100644 --- a/2020/21xxx/CVE-2020-21387.json +++ b/2020/21xxx/CVE-2020-21387.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21387", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21387", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the parameter type_en of Maccms 10 allows attackers to obtain the administrator cookie and escalate privileges via a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/magicblack/maccms10/issues/126", + "refsource": "MISC", + "name": "https://github.com/magicblack/maccms10/issues/126" } ] } diff --git a/2020/21xxx/CVE-2020-21431.json b/2020/21xxx/CVE-2020-21431.json index 8583c972456..8a40ce7a22b 100644 --- a/2020/21xxx/CVE-2020-21431.json +++ b/2020/21xxx/CVE-2020-21431.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21431", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21431", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HongCMS v3.0 contains an arbitrary file read and write vulnerability in the component /admin/index.php/template/edit." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Neeke/HongCMS/issues/14", + "refsource": "MISC", + "name": "https://github.com/Neeke/HongCMS/issues/14" } ] } diff --git a/2020/21xxx/CVE-2020-21434.json b/2020/21xxx/CVE-2020-21434.json index 2beb599c2a9..77b65bd2514 100644 --- a/2020/21xxx/CVE-2020-21434.json +++ b/2020/21xxx/CVE-2020-21434.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21434", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21434", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maccms 10 contains a cross-site scripting (XSS) vulnerability in the Editing function under the Member module. This vulnerability is exploited via a crafted payload in the nickname text field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Ksharp12138/maccms_userinfo_xss/blob/master/maccms_xss.md", + "refsource": "MISC", + "name": "https://github.com/Ksharp12138/maccms_userinfo_xss/blob/master/maccms_xss.md" } ] } diff --git a/2020/21xxx/CVE-2020-21493.json b/2020/21xxx/CVE-2020-21493.json index a85b3ac3752..266efc79356 100644 --- a/2020/21xxx/CVE-2020-21493.json +++ b/2020/21xxx/CVE-2020-21493.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21493", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21493", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in the component route\\user.php of Xiuno BBS v4.0.4 allows attackers to enumerate usernames." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wanghaiwei/xiuno-docker/issues/3", + "refsource": "MISC", + "name": "https://github.com/wanghaiwei/xiuno-docker/issues/3" + }, + { + "url": "https://gitee.com/xiuno/xiunobbs/issues/I1690W", + "refsource": "MISC", + "name": "https://gitee.com/xiuno/xiunobbs/issues/I1690W" } ] } diff --git a/2020/21xxx/CVE-2020-21494.json b/2020/21xxx/CVE-2020-21494.json index b5a5e3852c1..3b9681f5f39 100644 --- a/2020/21xxx/CVE-2020-21494.json +++ b/2020/21xxx/CVE-2020-21494.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21494", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21494", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the component install\\install.sql of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via changing the doctype value to 0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/xiuno/xiunobbs/issues/I16BHH", + "refsource": "MISC", + "name": "https://gitee.com/xiuno/xiunobbs/issues/I16BHH" + }, + { + "url": "https://github.com/wanghaiwei/xiuno-docker/issues/4", + "refsource": "MISC", + "name": "https://github.com/wanghaiwei/xiuno-docker/issues/4" } ] } diff --git a/2020/21xxx/CVE-2020-21495.json b/2020/21xxx/CVE-2020-21495.json index d1a361f7991..f813cfa1ccc 100644 --- a/2020/21xxx/CVE-2020-21495.json +++ b/2020/21xxx/CVE-2020-21495.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21495", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21495", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the component /admin/?setting-base.htm of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via the sitename parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wanghaiwei/xiuno-docker/issues/5", + "refsource": "MISC", + "name": "https://github.com/wanghaiwei/xiuno-docker/issues/5" + }, + { + "url": "https://gitee.com/xiuno/xiunobbs/issues/I16BI3", + "refsource": "MISC", + "name": "https://gitee.com/xiuno/xiunobbs/issues/I16BI3" } ] } diff --git a/2020/21xxx/CVE-2020-21496.json b/2020/21xxx/CVE-2020-21496.json index 86826e35705..4ef4391068e 100644 --- a/2020/21xxx/CVE-2020-21496.json +++ b/2020/21xxx/CVE-2020-21496.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21496", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21496", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the component /admin/?setting-base.htm of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via the sitebrief parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wanghaiwei/xiuno-docker/issues/5", + "refsource": "MISC", + "name": "https://github.com/wanghaiwei/xiuno-docker/issues/5" + }, + { + "url": "https://gitee.com/xiuno/xiunobbs/issues/I16BI3", + "refsource": "MISC", + "name": "https://gitee.com/xiuno/xiunobbs/issues/I16BI3" } ] } diff --git a/2020/21xxx/CVE-2020-21503.json b/2020/21xxx/CVE-2020-21503.json index f2949eeb2f4..5178267088b 100644 --- a/2020/21xxx/CVE-2020-21503.json +++ b/2020/21xxx/CVE-2020-21503.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21503", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21503", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "waimai Super Cms 20150505 has a logic flaw allowing attackers to modify a price, before form submission, by observing data in a packet capture. By setting the index.php?m=gift&a=addsave credit parameter to -1, the product is sold for free." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/caokang/waimai/issues/15", + "refsource": "MISC", + "name": "https://github.com/caokang/waimai/issues/15" } ] } diff --git a/2020/21xxx/CVE-2020-21504.json b/2020/21xxx/CVE-2020-21504.json index c2deac72f6a..505eabdec5e 100644 --- a/2020/21xxx/CVE-2020-21504.json +++ b/2020/21xxx/CVE-2020-21504.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21504", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21504", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?&m=Public&a=login." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/caokang/waimai/issues/16", + "refsource": "MISC", + "name": "https://github.com/caokang/waimai/issues/16" } ] } diff --git a/2020/21xxx/CVE-2020-21505.json b/2020/21xxx/CVE-2020-21505.json index 46ad0955c82..570a0ee682b 100644 --- a/2020/21xxx/CVE-2020-21505.json +++ b/2020/21xxx/CVE-2020-21505.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21505", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21505", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php/Link/addsave." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/caokang/waimai/issues/16", + "refsource": "MISC", + "name": "https://github.com/caokang/waimai/issues/16" } ] } diff --git a/2020/21xxx/CVE-2020-21506.json b/2020/21xxx/CVE-2020-21506.json index 5fdcd638282..2049bbaea1c 100644 --- a/2020/21xxx/CVE-2020-21506.json +++ b/2020/21xxx/CVE-2020-21506.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21506", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21506", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?m=Config&a=add." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/caokang/waimai/issues/16", + "refsource": "MISC", + "name": "https://github.com/caokang/waimai/issues/16" } ] } diff --git a/2020/21xxx/CVE-2020-21529.json b/2020/21xxx/CVE-2020-21529.json index f5bc9b7df61..5a3905e6735 100644 --- a/2020/21xxx/CVE-2020-21529.json +++ b/2020/21xxx/CVE-2020-21529.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/65/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/65/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21530.json b/2020/21xxx/CVE-2020-21530.json index 7ca31f870e8..bd17bf0314a 100644 --- a/2020/21xxx/CVE-2020-21530.json +++ b/2020/21xxx/CVE-2020-21530.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/61/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/61/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21531.json b/2020/21xxx/CVE-2020-21531.json index 1dc9fe3f58f..1ed27d53fe0 100644 --- a/2020/21xxx/CVE-2020-21531.json +++ b/2020/21xxx/CVE-2020-21531.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/63/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/63/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21532.json b/2020/21xxx/CVE-2020-21532.json index 99ed179371d..6e520b383ea 100644 --- a/2020/21xxx/CVE-2020-21532.json +++ b/2020/21xxx/CVE-2020-21532.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/64/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/64/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21533.json b/2020/21xxx/CVE-2020-21533.json index 40acc8b5ff5..e701be52c0a 100644 --- a/2020/21xxx/CVE-2020-21533.json +++ b/2020/21xxx/CVE-2020-21533.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/59/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/59/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21534.json b/2020/21xxx/CVE-2020-21534.json index 3c61c6d6044..55c154030c1 100644 --- a/2020/21xxx/CVE-2020-21534.json +++ b/2020/21xxx/CVE-2020-21534.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/58/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/58/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21535.json b/2020/21xxx/CVE-2020-21535.json index 50c25dfa699..5af4a602258 100644 --- a/2020/21xxx/CVE-2020-21535.json +++ b/2020/21xxx/CVE-2020-21535.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/62/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/62/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21648.json b/2020/21xxx/CVE-2020-21648.json index 9f399b63356..fcfc84aae5f 100644 --- a/2020/21xxx/CVE-2020-21648.json +++ b/2020/21xxx/CVE-2020-21648.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21648", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21648", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WDJA CMS v1.5.2 contains an arbitrary file deletion vulnerability in the component admin/cache/manage.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/shadoweb/wdja/issues/9", + "refsource": "MISC", + "name": "https://github.com/shadoweb/wdja/issues/9" } ] } diff --git a/2020/21xxx/CVE-2020-21649.json b/2020/21xxx/CVE-2020-21649.json index e166665d462..48e442a4bbd 100644 --- a/2020/21xxx/CVE-2020-21649.json +++ b/2020/21xxx/CVE-2020-21649.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21649", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21649", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Myucms v2.2.1 contains a server-side request forgery (SSRF) in the component \\controller\\index.php, which can be exploited via the sql() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/lolipop1234/XXD/issues/4", + "refsource": "MISC", + "name": "https://github.com/lolipop1234/XXD/issues/4" } ] } diff --git a/2020/21xxx/CVE-2020-21650.json b/2020/21xxx/CVE-2020-21650.json index 6cf30ad505d..1e283f594d8 100644 --- a/2020/21xxx/CVE-2020-21650.json +++ b/2020/21xxx/CVE-2020-21650.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21650", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21650", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \\controller\\Config.php, which can be exploited via the add() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/lolipop1234/XXD/issues/6", + "refsource": "MISC", + "name": "https://github.com/lolipop1234/XXD/issues/6" } ] } diff --git a/2020/21xxx/CVE-2020-21651.json b/2020/21xxx/CVE-2020-21651.json index 5291e1a974d..12d9ed4a74e 100644 --- a/2020/21xxx/CVE-2020-21651.json +++ b/2020/21xxx/CVE-2020-21651.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21651", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21651", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \\controller\\point.php, which can be exploited via the add() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/lolipop1234/XXD/issues/3", + "refsource": "MISC", + "name": "https://github.com/lolipop1234/XXD/issues/3" } ] } diff --git a/2020/21xxx/CVE-2020-21652.json b/2020/21xxx/CVE-2020-21652.json index 2d17fa4e1b6..b37d8519722 100644 --- a/2020/21xxx/CVE-2020-21652.json +++ b/2020/21xxx/CVE-2020-21652.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21652", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21652", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \\controller\\Config.php, which can be exploited via the addqq() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/lolipop1234/XXD/issues/7", + "refsource": "MISC", + "name": "https://github.com/lolipop1234/XXD/issues/7" } ] } diff --git a/2020/21xxx/CVE-2020-21653.json b/2020/21xxx/CVE-2020-21653.json index 2a2c6e9c6cc..9d961ca3c9b 100644 --- a/2020/21xxx/CVE-2020-21653.json +++ b/2020/21xxx/CVE-2020-21653.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21653", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21653", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Myucms v2.2.1 contains a server-side request forgery (SSRF) in the component \\controller\\index.php, which can be exploited via the sj() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/lolipop1234/XXD/issues/5", + "refsource": "MISC", + "name": "https://github.com/lolipop1234/XXD/issues/5" } ] } diff --git a/2020/21xxx/CVE-2020-21654.json b/2020/21xxx/CVE-2020-21654.json index 18f3a60005e..d23857ae2dd 100644 --- a/2020/21xxx/CVE-2020-21654.json +++ b/2020/21xxx/CVE-2020-21654.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21654", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21654", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "emlog v6.0 contains a vulnerability in the component admin\\template.php, which allows attackers to getshell via a crafted Zip file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emlog/emlog/issues/55", + "refsource": "MISC", + "name": "https://github.com/emlog/emlog/issues/55" } ] } diff --git a/2020/21xxx/CVE-2020-21656.json b/2020/21xxx/CVE-2020-21656.json index bee90648c46..67246123d94 100644 --- a/2020/21xxx/CVE-2020-21656.json +++ b/2020/21xxx/CVE-2020-21656.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21656", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21656", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "XYHCMS v3.6 contains a stored cross-site scripting (XSS) vulnerability in the component xyhai.php?s=/Link/index." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gosea/xyhcms3/issues/2", + "refsource": "MISC", + "name": "https://github.com/gosea/xyhcms3/issues/2" } ] } diff --git a/2020/21xxx/CVE-2020-21658.json b/2020/21xxx/CVE-2020-21658.json index 1611321c122..69351469c43 100644 --- a/2020/21xxx/CVE-2020-21658.json +++ b/2020/21xxx/CVE-2020-21658.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21658", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21658", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Request Forgery (CSRF) in WDJA CMS v1.5.2 allows attackers to arbitrarily add administrator accounts via a crafted URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/shadoweb/wdja/issues/10", + "refsource": "MISC", + "name": "https://github.com/shadoweb/wdja/issues/10" } ] } diff --git a/2020/21xxx/CVE-2020-21675.json b/2020/21xxx/CVE-2020-21675.json index 1992f7b84ec..f99423a610f 100644 --- a/2020/21xxx/CVE-2020-21675.json +++ b/2020/21xxx/CVE-2020-21675.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/78/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/78/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21676.json b/2020/21xxx/CVE-2020-21676.json index 2f94f7febf1..8a5e3c2f550 100644 --- a/2020/21xxx/CVE-2020-21676.json +++ b/2020/21xxx/CVE-2020-21676.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/mcj/tickets/76/", "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/tickets/76/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2020/21xxx/CVE-2020-21725.json b/2020/21xxx/CVE-2020-21725.json index f5e2fdde6aa..b6cda429ee3 100644 --- a/2020/21xxx/CVE-2020-21725.json +++ b/2020/21xxx/CVE-2020-21725.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21725", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21725", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenSNS v6.1.0 contains a blind SQL injection vulnerability in /Controller/ChinaCityController.class.php via the pid parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CoColizdf/CVE/issues/1", + "refsource": "MISC", + "name": "https://github.com/CoColizdf/CVE/issues/1" } ] } diff --git a/2020/21xxx/CVE-2020-21726.json b/2020/21xxx/CVE-2020-21726.json index 25845b659f9..5c59aa63bd2 100644 --- a/2020/21xxx/CVE-2020-21726.json +++ b/2020/21xxx/CVE-2020-21726.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21726", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21726", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenSNS v6.1.0 contains a blind SQL injection vulnerability in /Controller/ChinaCityController.class.php via the cid parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CoColizdf/CVE/issues/2", + "refsource": "MISC", + "name": "https://github.com/CoColizdf/CVE/issues/2" } ] } diff --git a/2020/21xxx/CVE-2020-21729.json b/2020/21xxx/CVE-2020-21729.json index 73512a09d22..87589d2aa0d 100644 --- a/2020/21xxx/CVE-2020-21729.json +++ b/2020/21xxx/CVE-2020-21729.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21729", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21729", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "JEECMS x1.1 contains a stored cross-site scripting (XSS) vulnerability in the component of /member-vipcenter.htm, which allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CoColizdf/CVE/issues/3", + "refsource": "MISC", + "name": "https://github.com/CoColizdf/CVE/issues/3" } ] } diff --git a/2020/21xxx/CVE-2020-21865.json b/2020/21xxx/CVE-2020-21865.json index c3b3ec4708d..daa95f7d4be 100644 --- a/2020/21xxx/CVE-2020-21865.json +++ b/2020/21xxx/CVE-2020-21865.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21865", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21865", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ThinkPHP50-CMS v1.0 contains a remote code execution (RCE) vulnerability in the component /public/?s=captcha." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nnngu/ThinkPHP50-CMS/issues/1", + "refsource": "MISC", + "name": "https://github.com/nnngu/ThinkPHP50-CMS/issues/1" } ] } diff --git a/2020/26xxx/CVE-2020-26217.json b/2020/26xxx/CVE-2020-26217.json index 90bfdb50034..75736b7dd47 100644 --- a/2020/26xxx/CVE-2020-26217.json +++ b/2020/26xxx/CVE-2020-26217.json @@ -123,6 +123,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "refsource": "MLIST", + "name": "[camel-commits] 20211006 [camel] branch main updated: Camel-XStream: Added a test about CVE-2020-26217", + "url": "https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27339.json b/2020/27xxx/CVE-2020-27339.json index 58b25db345a..b175dd018f0 100644 --- a/2020/27xxx/CVE-2020-27339.json +++ b/2020/27xxx/CVE-2020-27339.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Insyde found that a number of SMM drivers in InsydeH2O did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The following drivers were affected by this vulnerability: 1. PnpSmm 2. SmmResourceCheckDxe 3. BeepStatusCode For these three, an updated version was made for Kernel 5.0 - Kernel 5.5 in the following versions: 05.08.23/05.16.23/05.26.23/05.35.23/05.43.23/05.51.23 4. AhciBusDxe 5. IdeBusDxe 6. NvmExpressDxe 7. SdHostDriverDxe 10. SdMmcDeviceDxe For these, an updated version was released in Kernel 5.1 - Kernel 5.5 in the following versions: 05.16.25,05.26.25,05.35.25,05.43.25,05.51.25" + "value": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5)." } ] }, @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://www.insyde.com/products", - "refsource": "MISC", - "name": "https://www.insyde.com/products" - }, { "refsource": "MISC", "name": "https://www.insyde.com/security-pledge/SA-2021001", diff --git a/2020/28xxx/CVE-2020-28119.json b/2020/28xxx/CVE-2020-28119.json index e4b9f4c60e8..e8626ec2a2c 100644 --- a/2020/28xxx/CVE-2020-28119.json +++ b/2020/28xxx/CVE-2020-28119.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28119", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28119", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross site scripting vulnerability in 53KF < 2.0.0.2 that allows for arbitrary code to be executed via crafted HTML statement inserted into chat window." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/i900008/panexiang.github.io/blob/gh-pages/CVE-2020-28119.md", + "url": "https://github.com/i900008/panexiang.github.io/blob/gh-pages/CVE-2020-28119.md" } ] } diff --git a/2020/8xxx/CVE-2020-8955.json b/2020/8xxx/CVE-2020-8955.json index cfeff8fcfff..900cd7f55cf 100644 --- a/2020/8xxx/CVE-2020-8955.json +++ b/2020/8xxx/CVE-2020-8955.json @@ -91,6 +91,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-d242130019", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3LAJTLI3LWZRNCFYJ7PCBBTHUMCCBHH/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html" } ] } diff --git a/2020/9xxx/CVE-2020-9759.json b/2020/9xxx/CVE-2020-9759.json index a3632c2cc49..283ae46ed05 100644 --- a/2020/9xxx/CVE-2020-9759.json +++ b/2020/9xxx/CVE-2020-9759.json @@ -77,6 +77,11 @@ "refsource": "CONFIRM", "name": "https://blog.recurity-labs.com/2021-02-03/webOS_Pt1.html", "url": "https://blog.recurity-labs.com/2021-02-03/webOS_Pt1.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9760.json b/2020/9xxx/CVE-2020-9760.json index fa2d0f13953..1207ad9c968 100644 --- a/2020/9xxx/CVE-2020-9760.json +++ b/2020/9xxx/CVE-2020-9760.json @@ -71,6 +71,11 @@ "refsource": "GENTOO", "name": "GLSA-202003-51", "url": "https://security.gentoo.org/glsa/202003-51" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html" } ] } diff --git a/2021/0xxx/CVE-2021-0428.json b/2021/0xxx/CVE-2021-0428.json index 7680e06e320..bdcc7bb4c41 100644 --- a/2021/0xxx/CVE-2021-0428.json +++ b/2021/0xxx/CVE-2021-0428.json @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://source.android.com/security/bulletin/2021-04-01", - "url": "https://source.android.com/security/bulletin/2021-04-01" + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" } ] }, diff --git a/2021/0xxx/CVE-2021-0595.json b/2021/0xxx/CVE-2021-0595.json index c6d0ff2748b..fa5d7bc5ec6 100644 --- a/2021/0xxx/CVE-2021-0595.json +++ b/2021/0xxx/CVE-2021-0595.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0595", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-9 Android-10 Android-11 Android-8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In lockAllProfileTasks of RootWindowContainer.java, there is a possible way to access the work profile without the profile PIN, after logging in. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-177457096" } ] } diff --git a/2021/0xxx/CVE-2021-0598.json b/2021/0xxx/CVE-2021-0598.json index 23be53432c1..bc9e07e7663 100644 --- a/2021/0xxx/CVE-2021-0598.json +++ b/2021/0xxx/CVE-2021-0598.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0598", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108" } ] } diff --git a/2021/0xxx/CVE-2021-0635.json b/2021/0xxx/CVE-2021-0635.json index e5b43dd8106..5841a9fbc74 100644 --- a/2021/0xxx/CVE-2021-0635.json +++ b/2021/0xxx/CVE-2021-0635.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0635", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android SoC" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When extracting the incorrectly formatted flv file, the memory is damaged, the playback interface shows that the video cannot be played, and the log is found to be crashed. This problem may lead to hacker malicious code attacks, resulting in the loss of user rights.Product: Androidversion:Android-10Android ID: A-189402477" } ] } diff --git a/2021/0xxx/CVE-2021-0636.json b/2021/0xxx/CVE-2021-0636.json index ff2644b17d1..c576e324713 100644 --- a/2021/0xxx/CVE-2021-0636.json +++ b/2021/0xxx/CVE-2021-0636.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0636", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android SoC" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When extracting the incorrectly formatted avi file, the memory is damaged, the playback interface shows that the video cannot be played, and the log is found to be crashed. This problem may lead to hacker malicious code attacks, resulting in the loss of user rights.Product: Androidversion: Android-10Android ID: A-189392423" } ] } diff --git a/2021/0xxx/CVE-2021-0644.json b/2021/0xxx/CVE-2021-0644.json index 727824a7a04..098f863063a 100644 --- a/2021/0xxx/CVE-2021-0644.json +++ b/2021/0xxx/CVE-2021-0644.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0644", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In conditionallyRemoveIdentifiers of SubscriptionController.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-181053462" } ] } diff --git a/2021/0xxx/CVE-2021-0680.json b/2021/0xxx/CVE-2021-0680.json index 66e33897257..da2c78bef87 100644 --- a/2021/0xxx/CVE-2021-0680.json +++ b/2021/0xxx/CVE-2021-0680.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0680", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android SoC" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In system properties, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-192535676" } ] } diff --git a/2021/0xxx/CVE-2021-0681.json b/2021/0xxx/CVE-2021-0681.json index 8dd4cad000d..34ad58ed5e5 100644 --- a/2021/0xxx/CVE-2021-0681.json +++ b/2021/0xxx/CVE-2021-0681.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0681", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android SoC" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In system properties, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-192535337" } ] } diff --git a/2021/0xxx/CVE-2021-0682.json b/2021/0xxx/CVE-2021-0682.json index 6b35d5c80b1..930bdcff11d 100644 --- a/2021/0xxx/CVE-2021-0682.json +++ b/2021/0xxx/CVE-2021-0682.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0682", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555" } ] } diff --git a/2021/0xxx/CVE-2021-0683.json b/2021/0xxx/CVE-2021-0683.json index 450572b2d8e..c19f8cf3957 100644 --- a/2021/0xxx/CVE-2021-0683.json +++ b/2021/0xxx/CVE-2021-0683.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0683", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942" } ] } diff --git a/2021/0xxx/CVE-2021-0684.json b/2021/0xxx/CVE-2021-0684.json index fe133db5395..d348c1a4da9 100644 --- a/2021/0xxx/CVE-2021-0684.json +++ b/2021/0xxx/CVE-2021-0684.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0684", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-10 Android-11 Android-8.1 Android-9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665" } ] } diff --git a/2021/0xxx/CVE-2021-0685.json b/2021/0xxx/CVE-2021-0685.json index 74951cad6fc..ee31fb81f08 100644 --- a/2021/0xxx/CVE-2021-0685.json +++ b/2021/0xxx/CVE-2021-0685.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0685", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In ParsedIntentInfo of ParsedIntentInfo.java, there is a possible parcel serialization/deserialization mismatch due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-191055353" } ] } diff --git a/2021/0xxx/CVE-2021-0686.json b/2021/0xxx/CVE-2021-0686.json index 311ae3cb862..62199224182 100644 --- a/2021/0xxx/CVE-2021-0686.json +++ b/2021/0xxx/CVE-2021-0686.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0686", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In getDefaultSmsPackage of RoleManagerService.java, there is a possible way to get information about the default sms app of a different device user due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-177927831" } ] } diff --git a/2021/0xxx/CVE-2021-0687.json b/2021/0xxx/CVE-2021-0687.json index 987b342a3f7..f0335db1a52 100644 --- a/2021/0xxx/CVE-2021-0687.json +++ b/2021/0xxx/CVE-2021-0687.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0687", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-9 Android-10 Android-11 Android-8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943" } ] } diff --git a/2021/0xxx/CVE-2021-0688.json b/2021/0xxx/CVE-2021-0688.json index 142dd6e5e02..e61de6cf8a0 100644 --- a/2021/0xxx/CVE-2021-0688.json +++ b/2021/0xxx/CVE-2021-0688.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0688", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-10 Android-11 Android-8.1 Android-9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543" } ] } diff --git a/2021/0xxx/CVE-2021-0689.json b/2021/0xxx/CVE-2021-0689.json index 704ea1a1a0a..d41e12636aa 100644 --- a/2021/0xxx/CVE-2021-0689.json +++ b/2021/0xxx/CVE-2021-0689.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0689", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-10 Android-11 Android-8.1 Android-9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-190188264" } ] } diff --git a/2021/0xxx/CVE-2021-0690.json b/2021/0xxx/CVE-2021-0690.json index 691f93cabff..4c4de9e2514 100644 --- a/2021/0xxx/CVE-2021-0690.json +++ b/2021/0xxx/CVE-2021-0690.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0690", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-9 Android-10 Android-11 Android-8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757" } ] } diff --git a/2021/0xxx/CVE-2021-0691.json b/2021/0xxx/CVE-2021-0691.json index 4842d2757a6..0e72981e1b5 100644 --- a/2021/0xxx/CVE-2021-0691.json +++ b/2021/0xxx/CVE-2021-0691.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0691", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the SELinux policy configured in system_app.te, there is a possible way for system_app to gain code execution in other processes due to an overly-permissive SELinux policy. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-188554048" } ] } diff --git a/2021/0xxx/CVE-2021-0692.json b/2021/0xxx/CVE-2021-0692.json index b26ba30c903..11698c6498c 100644 --- a/2021/0xxx/CVE-2021-0692.json +++ b/2021/0xxx/CVE-2021-0692.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0692", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753" } ] } diff --git a/2021/0xxx/CVE-2021-0693.json b/2021/0xxx/CVE-2021-0693.json index 36d4a9efc82..1684ae15a6c 100644 --- a/2021/0xxx/CVE-2021-0693.json +++ b/2021/0xxx/CVE-2021-0693.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0693", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In openFile of HeapDumpProvider.java, there is a possible way to retrieve generated heap dumps from debuggable apps due to an unprotected provider. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184046948" } ] } diff --git a/2021/0xxx/CVE-2021-0695.json b/2021/0xxx/CVE-2021-0695.json index 6652044e8f8..f81e98ae922 100644 --- a/2021/0xxx/CVE-2021-0695.json +++ b/2021/0xxx/CVE-2021-0695.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0695", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-09-01", + "url": "https://source.android.com/security/bulletin/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernel" } ] } diff --git a/2021/1xxx/CVE-2021-1534.json b/2021/1xxx/CVE-2021-1534.json index 65c5a9e37bc..7d652f38147 100644 --- a/2021/1xxx/CVE-2021-1534.json +++ b/2021/1xxx/CVE-2021-1534.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-1534", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Email Security Appliance URL Filtering Bypass Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Email Security Appliance (ESA) ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "5.8", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp" + } + ] + }, + "source": { + "advisory": "cisco-sa-esa-url-bypass-sGcfsDrp", + "defect": [ + [ + "CSCvx60178" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1594.json b/2021/1xxx/CVE-2021-1594.json index f3f01817e63..b302a5f917d 100644 --- a/2021/1xxx/CVE-2021-1594.json +++ b/2021/1xxx/CVE-2021-1594.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-1594", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Identity Services Engine Privilege Escalation Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Identity Services Engine Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "7.5", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-266" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Identity Services Engine Privilege Escalation Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-UwqPrBM3" + } + ] + }, + "source": { + "advisory": "cisco-sa-ise-priv-esc-UwqPrBM3", + "defect": [ + [ + "CSCvy11976" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1810.json b/2021/1xxx/CVE-2021-1810.json index 077844a78cc..89494384c42 100644 --- a/2021/1xxx/CVE-2021-1810.json +++ b/2021/1xxx/CVE-2021-1810.json @@ -65,6 +65,11 @@ "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212326", "name": "https://support.apple.com/en-us/HT212326" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164375/Gatekeeper-Bypass-Proof-Of-Concept.html", + "url": "http://packetstormsecurity.com/files/164375/Gatekeeper-Bypass-Proof-Of-Concept.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20208.json b/2021/20xxx/CVE-2021-20208.json index 9de1cb7a466..338f18b0aeb 100644 --- a/2021/20xxx/CVE-2021-20208.json +++ b/2021/20xxx/CVE-2021-20208.json @@ -58,6 +58,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-d54e02d1b2", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4BZSJXROEFHYATAAHHRR6P3HUSMPQB3/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-c87ed13391", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4HSDIWXXNQBUW5ZS37RQMLJ7THK5AS/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b1bb3d3b20", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WJ3SVBHCSNQZAWSGLB6FBOCFU45FFG/" } ] }, diff --git a/2021/20xxx/CVE-2021-20264.json b/2021/20xxx/CVE-2021-20264.json index c2a3444fa79..16a7f2d6f85 100644 --- a/2021/20xxx/CVE-2021-20264.json +++ b/2021/20xxx/CVE-2021-20264.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20264", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "containers/openjdk", + "version": { + "version_data": [ + { + "version_value": "openjdk 1.8" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-266" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932283", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932283" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An insecure modification flaw in the /etc/passwd file was found in the openjdk-1.8 and openjdk-11 containers. This flaw allows an attacker with access to the container to modify the /etc/passwd and escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20289.json b/2021/20xxx/CVE-2021-20289.json index aeae8fa7fdc..5d71ed89597 100644 --- a/2021/20xxx/CVE-2021-20289.json +++ b/2021/20xxx/CVE-2021-20289.json @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "up to 4.6.0.Final" + "version_value": "resteasy 3.11.5.Final, resteasy 3.15.2.Final, resteasy 4.5.10.Final, resteasy 4.6.1.Final, resteasy 4.6.2.Final" } ] } @@ -48,11 +48,6 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210528-0008/", - "url": "https://security.netapp.com/advisory/ntap-20210528-0008/" } ] }, diff --git a/2021/20xxx/CVE-2021-20372.json b/2021/20xxx/CVE-2021-20372.json index 67eafe96635..ef71a6ddcf9 100644 --- a/2021/20xxx/CVE-2021-20372.json +++ b/2021/20xxx/CVE-2021-20372.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20372", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow a remote authenticated user to cause a denial of another user's service due to insufficient permission checking. IBM X-Force ID: 195518." } ] + }, + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6496805", + "title": "IBM Security Bulletin 6496805 (Sterling File Gateway)", + "url": "https://www.ibm.com/support/pages/node/6496805" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-sterling-cve202120372-dos (195518)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/195518" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "data_type": "CVE", + "data_version": "4.0", + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "I": "N", + "AC": "L", + "SCORE": "4.300", + "PR": "L", + "AV": "N", + "UI": "N", + "A": "L", + "C": "N", + "S": "U" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.6.5_3" + }, + { + "version_value": "6.0.0.6" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.1.0.1" + } + ] + }, + "product_name": "Sterling File Gateway" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2021-20372", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00" } } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20375.json b/2021/20xxx/CVE-2021-20375.json index 9d5f991f707..e2a25ac0352 100644 --- a/2021/20xxx/CVE-2021-20375.json +++ b/2021/20xxx/CVE-2021-20375.json @@ -1,17 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling File Gateway", + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.6.5_3" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.1.0.1" + } + ] + } + } + ] + } + } + ] + } + }, "CVE_data_meta": { "ID": "CVE-2021-20375", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00", + "STATE": "PUBLIC" + }, + "data_type": "CVE", + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "S": "U", + "C": "N", + "A": "N", + "UI": "N", + "AV": "N", + "SCORE": "6.500", + "AC": "L", + "PR": "L", + "I": "H" + }, + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + } + } + }, + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6496803", + "name": "https://www.ibm.com/support/pages/node/6496803", + "title": "IBM Security Bulletin 6496803 (Sterling File Gateway)", + "refsource": "CONFIRM" + }, + { + "name": "ibm-sterling-cve202120375-data-manipulation (195567)", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/195567" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Data Manipulation" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow an authenticated user to intercept and replace a message sent by another user due to improper access controls. IBM X-Force ID: 195567." } ] } diff --git a/2021/20xxx/CVE-2021-20376.json b/2021/20xxx/CVE-2021-20376.json index 7b0f429ffd7..23c9eb4b06a 100644 --- a/2021/20xxx/CVE-2021-20376.json +++ b/2021/20xxx/CVE-2021-20376.json @@ -1,17 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "I": "N", + "AC": "L", + "SCORE": "4.300", + "PR": "L", + "AV": "N", + "UI": "N", + "A": "N", + "C": "L", + "S": "U" + }, + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + } + } + }, + "data_type": "CVE", "CVE_data_meta": { "ID": "CVE-2021-20376", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.6.5_3" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.1.0.1" + } + ] + }, + "product_name": "Sterling File Gateway" + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow an authenticated attacker to enumerate usernames due to there being an observable discrepancy in returned messages. IBM X-Force ID: 195568." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6496789", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6496789", + "title": "IBM Security Bulletin 6496789 (Sterling File Gateway)" + }, + { + "refsource": "XF", + "name": "ibm-sterling-cve202120376-info-disc (195568)", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/195568" } ] } diff --git a/2021/20xxx/CVE-2021-20473.json b/2021/20xxx/CVE-2021-20473.json index 80a3823e723..a87f445025f 100644 --- a/2021/20xxx/CVE-2021-20473.json +++ b/2021/20xxx/CVE-2021-20473.json @@ -1,17 +1,104 @@ { "data_type": "CVE", - "data_format": "MITRE", + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "I": "L", + "SCORE": "6.300", + "AC": "L", + "PR": "L", + "AV": "N", + "UI": "N", + "A": "L", + "C": "L", + "S": "U" + } + } + }, "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.6.5_3" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.1.0.1" + } + ] + }, + "product_name": "Sterling File Gateway" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, "CVE_data_meta": { "ID": "CVE-2021-20473", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway User Interface 2.2.0.0 through 6.1.1.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 196944." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6496785", + "title": "IBM Security Bulletin 6496785 (Sterling File Gateway)", + "url": "https://www.ibm.com/support/pages/node/6496785" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196944", + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-sterling-cve202120473-session-fixation (196944)" + } + ] + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Gain Privileges", + "lang": "eng" + } + ] } ] } diff --git a/2021/20xxx/CVE-2021-20481.json b/2021/20xxx/CVE-2021-20481.json index f71b986823b..81d15f31b5c 100644 --- a/2021/20xxx/CVE-2021-20481.json +++ b/2021/20xxx/CVE-2021-20481.json @@ -1,17 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.6.5_3" + }, + { + "version_value": "6.0.0.6" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.1.0.1" + } + ] + }, + "product_name": "Sterling File Gateway" + } + ] + } + } + ] + } + }, "CVE_data_meta": { + "STATE": "PUBLIC", "ID": "CVE-2021-20481", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ASSIGNER": "psirt@us.ibm.com" + }, + "data_type": "CVE", + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "H", + "RL": "O" + }, + "BM": { + "AV": "N", + "I": "L", + "PR": "L", + "SCORE": "5.400", + "AC": "L", + "C": "L", + "S": "C", + "UI": "R", + "A": "N" + } + } + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6496781 (Sterling File Gateway)", + "name": "https://www.ibm.com/support/pages/node/6496781", + "url": "https://www.ibm.com/support/pages/node/6496781" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-sterling-cve202120481-xss (197503)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/197503" + } + ] + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 197503.", + "lang": "eng" } ] } diff --git a/2021/20xxx/CVE-2021-20489.json b/2021/20xxx/CVE-2021-20489.json index fa6be40ace8..95f2c152505 100644 --- a/2021/20xxx/CVE-2021-20489.json +++ b/2021/20xxx/CVE-2021-20489.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20489", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6496777", + "title": "IBM Security Bulletin 6496777 (Sterling File Gateway)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6496777" + }, + { + "refsource": "XF", + "name": "ibm-sterling-cve202120489-csrf (197790)", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/197790" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Gain Access", + "lang": "eng" + } + ] + } + ] }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 197790.", + "lang": "eng" } ] - } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling File Gateway", + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "6.1.0.3" + }, + { + "version_value": "5.2.6.5_3" + }, + { + "version_value": "6.0.0.6" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ID": "CVE-2021-20489" + }, + "data_type": "CVE", + "impact": { + "cvssv3": { + "BM": { + "I": "L", + "SCORE": "4.300", + "PR": "N", + "AC": "L", + "AV": "N", + "UI": "R", + "A": "N", + "C": "N", + "S": "U" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "data_version": "4.0" } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20552.json b/2021/20xxx/CVE-2021-20552.json index 92976983d10..e5c1b43d818 100644 --- a/2021/20xxx/CVE-2021-20552.json +++ b/2021/20xxx/CVE-2021-20552.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20552", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 199170." } ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6496771", + "title": "IBM Security Bulletin 6496771 (Sterling File Gateway)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6496771" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-sterling-cve202120552-info-disc (199170)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199170" + } + ] + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "data_type": "CVE", + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "I": "N", + "SCORE": "4.300", + "PR": "L", + "AC": "L", + "C": "L", + "S": "U", + "UI": "N", + "A": "N" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling File Gateway", + "version": { + "version_data": [ + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.1.0.2" + } + ] + } + } + ] + } + } + ] + } + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ID": "CVE-2021-20552", + "STATE": "PUBLIC" } } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20554.json b/2021/20xxx/CVE-2021-20554.json index fca07acfff5..347aaa832d3 100644 --- a/2021/20xxx/CVE-2021-20554.json +++ b/2021/20xxx/CVE-2021-20554.json @@ -1,17 +1,95 @@ { - "data_type": "CVE", - "data_format": "MITRE", "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6493881", + "name": "https://www.ibm.com/support/pages/node/6493881", + "title": "IBM Security Bulletin 6493881 (Sterling Order Management)", + "refsource": "CONFIRM" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199179", + "name": "ibm-sterling-cve202120554-xss (199179)" + } + ] + }, + "data_format": "MITRE", + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "9.4" + }, + { + "version_value": "9.5" + }, + { + "version_value": "10.0" + } + ] + }, + "product_name": "Sterling Order Management" + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "E": "H", + "RL": "O", + "RC": "C" + }, + "BM": { + "A": "N", + "I": "L", + "AV": "N", + "UI": "R", + "S": "C", + "C": "L", + "SCORE": "6.100", + "AC": "L", + "PR": "N" + } + } + }, "CVE_data_meta": { + "DATE_PUBLIC": "2021-09-29T00:00:00", "ID": "CVE-2021-20554", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com" }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling Order Management 9.4, 9.5, and 10.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199179.", + "lang": "eng" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] } ] } diff --git a/2021/20xxx/CVE-2021-20561.json b/2021/20xxx/CVE-2021-20561.json index 398d1d620a6..a3dae34f51d 100644 --- a/2021/20xxx/CVE-2021-20561.json +++ b/2021/20xxx/CVE-2021-20561.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", - "data_format": "MITRE", + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "H" + }, + "BM": { + "SCORE": "5.400", + "PR": "L", + "AC": "L", + "I": "L", + "AV": "N", + "A": "N", + "UI": "R", + "S": "C", + "C": "L" + } + } + }, "data_version": "4.0", + "data_type": "CVE", "CVE_data_meta": { + "STATE": "PUBLIC", "ID": "CVE-2021-20561", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ASSIGNER": "psirt@us.ibm.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Sterling File Gateway", + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "6.1.0.2" + }, + { + "version_value": "6.0.0.6" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "5.2.6.5_4" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199230." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6496759", + "title": "IBM Security Bulletin 6496759 (Sterling File Gateway)", + "url": "https://www.ibm.com/support/pages/node/6496759" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199230", + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-sterling-cve202120561-xss (199230)" + } + ] + }, + "data_format": "MITRE" } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20571.json b/2021/20xxx/CVE-2021-20571.json index 654808a5a29..8b73a848ef3 100644 --- a/2021/20xxx/CVE-2021-20571.json +++ b/2021/20xxx/CVE-2021-20571.json @@ -1,17 +1,110 @@ { "data_type": "CVE", - "data_format": "MITRE", "data_version": "4.0", + "impact": { + "cvssv3": { + "TM": { + "E": "H", + "RC": "C", + "RL": "O" + }, + "BM": { + "UI": "N", + "A": "N", + "C": "L", + "S": "C", + "I": "L", + "SCORE": "4.900", + "PR": "L", + "AC": "H", + "AV": "N" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + }, + { + "version_value": "5.2.6.5_4" + }, + { + "version_value": "6.0.0.6" + } + ] + }, + "product_name": "Sterling B2B Integrator" + } + ] + } + } + ] + } + }, "CVE_data_meta": { - "ID": "CVE-2021-20571", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ID": "CVE-2021-20571" }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199246.", + "lang": "eng" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6496753 (Sterling B2B Integrator)", + "name": "https://www.ibm.com/support/pages/node/6496753", + "url": "https://www.ibm.com/support/pages/node/6496753" + }, + { + "name": "ibm-sterling-cve202120571-xss (199246)", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199246" + } + ] + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] } ] } diff --git a/2021/20xxx/CVE-2021-20578.json b/2021/20xxx/CVE-2021-20578.json index 7bd9d19be04..de44936d3e9 100644 --- a/2021/20xxx/CVE-2021-20578.json +++ b/2021/20xxx/CVE-2021-20578.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20578", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Gain Access" + } + ] + } + ] }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 could allow an attacker to perform unauthorized actions due to improper or missing authentication controls. IBM X-Force ID: 199282.", + "lang": "eng" } ] - } + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2021-20578", + "DATE_PUBLIC": "2021-09-29T00:00:00" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cloud Pak for Security", + "version": { + "version_data": [ + { + "version_value": "1.7.0.0" + }, + { + "version_value": "1.7.1.0" + }, + { + "version_value": "1.7.2.0" + }, + { + "version_value": "1.8.0.0" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "SCORE": "5.400", + "C": "L", + "AC": "L", + "PR": "N", + "A": "N", + "I": "L", + "AV": "A", + "S": "U", + "UI": "N" + } + } + }, + "data_type": "CVE", + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6493729", + "name": "https://www.ibm.com/support/pages/node/6493729", + "title": "IBM Security Bulletin 6493729 (Cloud Pak for Security)", + "refsource": "CONFIRM" + }, + { + "name": "ibm-cp4s-cve202120578-improper-auth (199282)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199282", + "refsource": "XF", + "title": "X-Force Vulnerability Report" + } + ] + }, + "data_version": "4.0" } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20584.json b/2021/20xxx/CVE-2021-20584.json index ff8182be7dd..bf34f6acde5 100644 --- a/2021/20xxx/CVE-2021-20584.json +++ b/2021/20xxx/CVE-2021-20584.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Gain Access" + } + ] + } + ] + }, "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20584", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6496751", + "title": "IBM Security Bulletin 6496751 (Sterling File Gateway)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6496751" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199397", + "refsource": "XF", + "name": "ibm-sterling-cve202120584-file-upload (199397)", + "title": "X-Force Vulnerability Report" + } + ] }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow a remote attacker to upload arbitrary files, caused by improper access controls. IBM X-Force ID: 199397.", + "lang": "eng" } ] - } + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ID": "CVE-2021-20584", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling File Gateway", + "version": { + "version_data": [ + { + "version_value": "2.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.0.0.0" + }, + { + "version_value": "6.1.0.2" + }, + { + "version_value": "6.0.0.6" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "5.2.6.5_4" + } + ] + } + } + ] + } + } + ] + } + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "SCORE": "6.500", + "AC": "L", + "PR": "L", + "I": "H", + "S": "U", + "C": "N", + "A": "N", + "UI": "N" + }, + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + } + } + }, + "data_type": "CVE" } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20602.json b/2021/20xxx/CVE-2021-20602.json index 7de89ed6be4..7641b85ab6f 100644 --- a/2021/20xxx/CVE-2021-20602.json +++ b/2021/20xxx/CVE-2021-20602.json @@ -4,14 +4,90 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20602", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GOT2000 series GT21 model GT2107-WTBD; GOT2000 series GT21 model GT2107-WTSD; GOT2000 series GT21 model GT2104-RTBD; GOT2000 series GT21 model GT2104-PMBD; GOT2000 series GT21 model GT2103-PMBD; GOT SIMPLE series GS21 model GS2110-WTBD; GOT SIMPLE series GS21 model GS2107-WTBD; GOT SIMPLE series GS21 model GS2110-WTBD-N; GOT SIMPLE series GS21 model GS2107-WTBD-N; LE7-40GU-L", + "version": { + "version_data": [ + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Handling of Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf", + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf" + }, + { + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99532713/index.html", + "url": "https://jvn.jp/vu/JVNVU99532713/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Handling of Exceptional Conditions vulnerability in GOT2000 series GT21 model GT2107-WTBD all versions, GT2107-WTSD all versions, GT2104-RTBD all versions, GT2104-PMBD all versions, GT2103-PMBD all versions, GOT SIMPLE series GS21 model GS2110-WTBD all versions, GS2107-WTBD all versions, GS2110-WTBD-N all versions, GS2107-WTBD-N all versions and LE7-40GU-L all versions allows a remote unauthenticated attacker to cause DoS condition of the products by sending specially crafted packets." } ] } diff --git a/2021/20xxx/CVE-2021-20603.json b/2021/20xxx/CVE-2021-20603.json index 826e7963875..8dc12105444 100644 --- a/2021/20xxx/CVE-2021-20603.json +++ b/2021/20xxx/CVE-2021-20603.json @@ -4,14 +4,90 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20603", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GOT2000 series GT21 model GT2107-WTBD; GOT2000 series GT21 model GT2107-WTSD; GOT2000 series GT21 model GT2104-RTBD; GOT2000 series GT21 model GT2104-PMBD; GOT2000 series GT21 model GT2103-PMBD; GOT SIMPLE series GS21 model GS2110-WTBD; GOT SIMPLE series GS21 model GS2107-WTBD; GOT SIMPLE series GS21 model GS2110-WTBD-N; GOT SIMPLE series GS21 model GS2107-WTBD-N; LE7-40GU-L", + "version": { + "version_data": [ + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf", + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf" + }, + { + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99532713/index.html", + "url": "https://jvn.jp/vu/JVNVU99532713/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in GOT2000 series GT21 model GT2107-WTBD all versions, GT2107-WTSD all versions, GT2104-RTBD all versions, GT2104-PMBD all versions, GT2103-PMBD all versions, GOT SIMPLE series GS21 model GS2110-WTBD all versions, GS2107-WTBD all versions, GS2110-WTBD-N all versions, GS2107-WTBD-N all versions and LE7-40GU-L all versions allows a remote unauthenticated attacker to cause DoS condition of the products by sending specially crafted packets." } ] } diff --git a/2021/20xxx/CVE-2021-20604.json b/2021/20xxx/CVE-2021-20604.json index 9a347679b6d..85b6667faf9 100644 --- a/2021/20xxx/CVE-2021-20604.json +++ b/2021/20xxx/CVE-2021-20604.json @@ -4,14 +4,90 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20604", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GOT2000 series GT21 model GT2107-WTBD; GOT2000 series GT21 model GT2107-WTSD; GOT2000 series GT21 model GT2104-RTBD; GOT2000 series GT21 model GT2104-PMBD; GOT2000 series GT21 model GT2103-PMBD; GOT SIMPLE series GS21 model GS2110-WTBD; GOT SIMPLE series GS21 model GS2107-WTBD; GOT SIMPLE series GS21 model GS2110-WTBD-N; GOT SIMPLE series GS21 model GS2107-WTBD-N; LE7-40GU-L", + "version": { + "version_data": [ + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf", + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf" + }, + { + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99532713/index.html", + "url": "https://jvn.jp/vu/JVNVU99532713/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in GOT2000 series GT21 model GT2107-WTBD all versions, GT2107-WTSD all versions, GT2104-RTBD all versions, GT2104-PMBD all versions, GT2103-PMBD all versions, GOT SIMPLE series GS21 model GS2110-WTBD all versions, GS2107-WTBD all versions, GS2110-WTBD-N all versions, GS2107-WTBD-N all versions and LE7-40GU-L all versions allows a remote unauthenticated attacker to cause DoS condition of the products by sending specially crafted packets." } ] } diff --git a/2021/20xxx/CVE-2021-20605.json b/2021/20xxx/CVE-2021-20605.json index 302300fa75e..fceb9b158a5 100644 --- a/2021/20xxx/CVE-2021-20605.json +++ b/2021/20xxx/CVE-2021-20605.json @@ -4,14 +4,90 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20605", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GOT2000 series GT21 model GT2107-WTBD; GOT2000 series GT21 model GT2107-WTSD; GOT2000 series GT21 model GT2104-RTBD; GOT2000 series GT21 model GT2104-PMBD; GOT2000 series GT21 model GT2103-PMBD; GOT SIMPLE series GS21 model GS2110-WTBD; GOT SIMPLE series GS21 model GS2107-WTBD; GOT SIMPLE series GS21 model GS2110-WTBD-N; GOT SIMPLE series GS21 model GS2107-WTBD-N; LE7-40GU-L", + "version": { + "version_data": [ + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + }, + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf", + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-014_en.pdf" + }, + { + "refsource": "MISC", + "name": "https://jvn.jp/vu/JVNVU99532713/index.html", + "url": "https://jvn.jp/vu/JVNVU99532713/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in GOT2000 series GT21 model GT2107-WTBD all versions, GT2107-WTSD all versions, GT2104-RTBD all versions, GT2104-PMBD all versions, GT2103-PMBD all versions, GOT SIMPLE series GS21 model GS2110-WTBD all versions, GS2107-WTBD all versions, GS2110-WTBD-N all versions, GS2107-WTBD-N all versions and LE7-40GU-L all versions allows a remote unauthenticated attacker to cause DoS condition of the products by sending specially crafted packets." } ] } diff --git a/2021/21xxx/CVE-2021-21089.json b/2021/21xxx/CVE-2021-21089.json index 7bdda43e25b..74b45804d83 100644 --- a/2021/21xxx/CVE-2021-21089.json +++ b/2021/21xxx/CVE-2021-21089.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-02-09T23:00:00.000Z", "ID": "CVE-2021-21089", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Acrobat Reader DC URI Parsing Out-Of-Bounds Read " }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acrobat Reader", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "2020.013.20074" + }, + { + "version_affected": "<=", + "version_value": "2020.001.30018" + }, + { + "version_affected": "<=", + "version_value": "2017.011.30188" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally escalate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "None", + "baseScore": 3.3, + "baseSeverity": "Low", + "confidentialityImpact": "Low", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21682.json b/2021/21xxx/CVE-2021-21682.json index e96654ce6a2..bb25c354579 100644 --- a/2021/21xxx/CVE-2021-21682.json +++ b/2021/21xxx/CVE-2021-21682.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21682", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "2.314", + "version_affected": "<=" + }, + { + "version_value": "LTS 2.303.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-42: Path Equivalence: 'filename.' (Trailing Dot)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424", + "url": "https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424", + "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211006 Multiple vulnerabilities in Jenkins and Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/10/06/1" } ] } diff --git a/2021/21xxx/CVE-2021-21683.json b/2021/21xxx/CVE-2021-21683.json index 606631eb01c..42bb022f08e 100644 --- a/2021/21xxx/CVE-2021-21683.json +++ b/2021/21xxx/CVE-2021-21683.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21683", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "2.314", + "version_affected": "<=" + }, + { + "version_value": "LTS 2.303.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2481", + "url": "https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2481", + "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211006 Multiple vulnerabilities in Jenkins and Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/10/06/1" } ] } diff --git a/2021/21xxx/CVE-2021-21684.json b/2021/21xxx/CVE-2021-21684.json index 5dccde6ed91..7bd32910d6b 100644 --- a/2021/21xxx/CVE-2021-21684.json +++ b/2021/21xxx/CVE-2021-21684.json @@ -1,17 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21684", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Git Plugin", + "version": { + "version_data": [ + { + "version_value": "4.8.2", + "version_affected": "<=" + }, + { + "version_value": "4.7.1.1", + "version_affected": "!" + }, + { + "version_value": "4.3.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2499", + "url": "https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2499", + "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211006 Multiple vulnerabilities in Jenkins and Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/10/06/1" } ] } diff --git a/2021/21xxx/CVE-2021-21704.json b/2021/21xxx/CVE-2021-21704.json index baa93635291..8f5a02ed9da 100644 --- a/2021/21xxx/CVE-2021-21704.json +++ b/2021/21xxx/CVE-2021-21704.json @@ -1,18 +1,134 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@php.net", + "DATE_PUBLIC": "2021-06-21T11:41:00.000Z", "ID": "CVE-2021-21704", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Multiple vulnerabilities in Firebird client extension" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.3.x", + "version_value": "7.3.29" + }, + { + "version_affected": "<", + "version_name": "7.4.x", + "version_value": "7.4.21" + }, + { + "version_affected": "<", + "version_name": "8.0.X", + "version_value": "8.0.8" + } + ] + } + } + ] + }, + "vendor_name": "PHP Group" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "reported by trichimtrich at gmail dot com" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125 Out-of-bounds Read" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-190 Integer Overflow or Wraparound" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://bugs.php.net/bug.php?id=76448", + "name": "https://bugs.php.net/bug.php?id=76448" + }, + { + "refsource": "MISC", + "url": "https://bugs.php.net/bug.php?id=76449", + "name": "https://bugs.php.net/bug.php?id=76449" + }, + { + "refsource": "MISC", + "url": "https://bugs.php.net/bug.php?id=76450", + "name": "https://bugs.php.net/bug.php?id=76450" + }, + { + "refsource": "MISC", + "url": "https://bugs.php.net/bug.php?id=76452", + "name": "https://bugs.php.net/bug.php?id=76452" + } + ] + }, + "source": { + "defect": [ + "https://bugs.php.net/bug.php?id=76448", + "https://bugs.php.net/bug.php?id=76449", + "https://bugs.php.net/bug.php?id=76450", + "https://bugs.php.net/bug.php?id=76452", + "" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21705.json b/2021/21xxx/CVE-2021-21705.json index a749284ee5d..37d4261fbfc 100644 --- a/2021/21xxx/CVE-2021-21705.json +++ b/2021/21xxx/CVE-2021-21705.json @@ -1,18 +1,107 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@php.net", + "DATE_PUBLIC": "2021-06-28T11:41:00.000Z", "ID": "CVE-2021-21705", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Incorrect URL validation in FILTER_VALIDATE_URL" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.3.x", + "version_value": "7.3.29" + }, + { + "version_affected": "<", + "version_name": "7.4.x", + "version_value": "7.4.21" + }, + { + "version_affected": "<", + "version_name": "8.0.X", + "version_value": "8.0.8" + } + ] + } + } + ] + }, + "vendor_name": "PHP Group" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "reported by vi at hackberry dot xyz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://bugs.php.net/bug.php?id=81122", + "name": "https://bugs.php.net/bug.php?id=81122" + } + ] + }, + "source": { + "defect": [ + "https://bugs.php.net/bug.php?id=81122" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21706.json b/2021/21xxx/CVE-2021-21706.json index b5f3490c0c7..2cca8a45ee6 100644 --- a/2021/21xxx/CVE-2021-21706.json +++ b/2021/21xxx/CVE-2021-21706.json @@ -1,18 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@php.net", + "DATE_PUBLIC": "2021-09-21T11:32:00.000Z", "ID": "CVE-2021-21706", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ZipArchive::extractTo may extract outside of destination dir" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_name": "7.3.x", + "version_value": "7.3.31" + }, + { + "platform": "Windows", + "version_affected": "<", + "version_name": "7.4.x", + "version_value": "7.4.24" + }, + { + "platform": "Windows", + "version_affected": "<", + "version_name": "8.0.X", + "version_value": "8.0.11" + } + ] + } + } + ] + }, + "vendor_name": "PHP Group" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "reported by vi at hackberry dot xyz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-24 Path Traversal: '../filedir'" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://bugs.php.net/bug.php?id=81420", + "name": "https://bugs.php.net/bug.php?id=81420" + } + ] + }, + "source": { + "defect": [ + "https://bugs.php.net/bug.php?id=81420" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22005.json b/2021/22xxx/CVE-2021-22005.json index 6d4f81265be..fb7ae1f2cdb 100644 --- a/2021/22xxx/CVE-2021-22005.json +++ b/2021/22xxx/CVE-2021-22005.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.vmware.com/security/advisories/VMSA-2021-0020.html", "url": "https://www.vmware.com/security/advisories/VMSA-2021-0020.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-Analytics-CEIP-Service-File-Upload.html", + "url": "http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-Analytics-CEIP-Service-File-Upload.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22147.json b/2021/22xxx/CVE-2021-22147.json index edee8ffd321..683b391c91f 100644 --- a/2021/22xxx/CVE-2021-22147.json +++ b/2021/22xxx/CVE-2021-22147.json @@ -53,6 +53,11 @@ "url": "https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344", "refsource": "MISC", "name": "https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0002/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0002/" } ] }, diff --git a/2021/22xxx/CVE-2021-22257.json b/2021/22xxx/CVE-2021-22257.json index af10b6b825d..dc8e4c67574 100644 --- a/2021/22xxx/CVE-2021-22257.json +++ b/2021/22xxx/CVE-2021-22257.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22257", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.0, <14.0.9" + }, + { + "version_value": ">=14.1, <14.1.4" + }, + { + "version_value": ">=14.2, <14.2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/23832", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/23832", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22257.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22257.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab affecting all versions starting from 14.0 before 14.0.9, all versions starting from 14.1 before 14.1.4, all versions starting from 14.2 before 14.2.2. The route for /user.keys is not restricted on instances with public visibility disabled. This allows user enumeration on such instances." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "GitLab would like to thank a customer who reported this issue." + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22258.json b/2021/22xxx/CVE-2021-22258.json index 21d3c7af9ff..5b91f96035e 100644 --- a/2021/22xxx/CVE-2021-22258.json +++ b/2021/22xxx/CVE-2021-22258.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22258", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.2, <14.2.2" + }, + { + "version_value": ">=14.1, <14.1.4" + }, + { + "version_value": ">=8.9, <14.0.9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/24231", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/24231", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/410436", + "url": "https://hackerone.com/reports/410436", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22258.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22258.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The project import/export feature in GitLab 8.9 and greater could be used to obtain otherwise private email addresses" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks ngalog for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22259.json b/2021/22xxx/CVE-2021-22259.json index 9cbd6e5278c..607ee413b2a 100644 --- a/2021/22xxx/CVE-2021-22259.json +++ b/2021/22xxx/CVE-2021-22259.json @@ -4,15 +4,86 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22259", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.6, <14.1.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/335146", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/335146", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22259.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22259.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A potential DOS vulnerability was discovered in GitLab EE starting with version 12.6 due to lack of pagination in dependencies API." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22261.json b/2021/22xxx/CVE-2021-22261.json index c6d2f280750..ee97e462a5d 100644 --- a/2021/22xxx/CVE-2021-22261.json +++ b/2021/22xxx/CVE-2021-22261.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22261", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.9, <14.2.2" + }, + { + "version_value": ">=13.8, <14.1.4" + }, + { + "version_value": ">=13.7, <14.0.9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/328389", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/328389", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1132083", + "url": "https://hackerone.com/reports/1132083", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22261.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22261.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored Cross-Site Scripting vulnerability in the Jira integration in GitLab version 13.7 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious Jira API responses" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 7.2, + "baseSeverity": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks thornguyen for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22262.json b/2021/22xxx/CVE-2021-22262.json index 18fe69946bc..6e21b136244 100644 --- a/2021/22xxx/CVE-2021-22262.json +++ b/2021/22xxx/CVE-2021-22262.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22262", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.12, <14.2.2" + }, + { + "version_value": ">=13.11, <14.1.4" + }, + { + "version_value": ">=13.10, <14.0.9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/327062", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/327062", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1147812", + "url": "https://hackerone.com/reports/1147812", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22262.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22262.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing access control in GitLab version 13.10 and above with Jira Cloud integration enabled allows Jira users without administrative privileges to add and remove Jira Connect Namespaces via the GitLab.com for Jira Cloud application configuration page" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks updatelap for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22264.json b/2021/22xxx/CVE-2021-22264.json index 7c34f12530f..2e614a05b56 100644 --- a/2021/22xxx/CVE-2021-22264.json +++ b/2021/22xxx/CVE-2021-22264.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22264", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.8, <14.0.9" + }, + { + "version_value": ">=14.1, <14.1.4" + }, + { + "version_value": ">=14.2, <14.2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper privilege management in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/336073", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/336073", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22264.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22264.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab affecting all versions starting from 13.8 before 14.0.9, all versions starting from 14.1 before 14.1.4, all versions starting from 14.2 before 14.2.2. Under specialized conditions, an invited group member may continue to have access to a project even after the invited group, which the member was part of, is deleted." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was discovered internally by the member of the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22555.json b/2021/22xxx/CVE-2021-22555.json index 08728beb8b5..f36e1d6314d 100644 --- a/2021/22xxx/CVE-2021-22555.json +++ b/2021/22xxx/CVE-2021-22555.json @@ -114,6 +114,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html", "url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22557.json b/2021/22xxx/CVE-2021-22557.json index 4d76c3b8b94..f60812b2b82 100644 --- a/2021/22xxx/CVE-2021-22557.json +++ b/2021/22xxx/CVE-2021-22557.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@google.com", "ID": "CVE-2021-22557", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Code execution in SLO Generator via YAML Payload" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SLO Generator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "2.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Google LLC" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Kiran Ghimire" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://github.com/google/slo-generator/pull/173", + "name": "https://github.com/google/slo-generator/pull/173" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22930.json b/2021/22xxx/CVE-2021-22930.json index 707f85719fd..f53c2216aaa 100644 --- a/2021/22xxx/CVE-2021-22930.json +++ b/2021/22xxx/CVE-2021-22930.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22930", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "https://github.com/nodejs/node", + "version": { + "version_data": [ + { + "version_value": "Fixed versions 16.6.0, 14.17.4, and 12.22.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free (CWE-416)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1238162", + "url": "https://hackerone.com/reports/1238162" + }, + { + "refsource": "MISC", + "name": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/", + "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior." } ] } diff --git a/2021/22xxx/CVE-2021-22945.json b/2021/22xxx/CVE-2021-22945.json index 111dae18c13..343e7a69851 100644 --- a/2021/22xxx/CVE-2021-22945.json +++ b/2021/22xxx/CVE-2021-22945.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1269242", "url": "https://hackerone.com/reports/1269242" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-fc96a3a749", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" } ] }, diff --git a/2021/22xxx/CVE-2021-22946.json b/2021/22xxx/CVE-2021-22946.json index 63cb83062d8..f234bc41566 100644 --- a/2021/22xxx/CVE-2021-22946.json +++ b/2021/22xxx/CVE-2021-22946.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1334111", "url": "https://hackerone.com/reports/1334111" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-fc96a3a749", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" } ] }, diff --git a/2021/22xxx/CVE-2021-22947.json b/2021/22xxx/CVE-2021-22947.json index 183b7298004..c2e1ab58fc0 100644 --- a/2021/22xxx/CVE-2021-22947.json +++ b/2021/22xxx/CVE-2021-22947.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1334763", "url": "https://hackerone.com/reports/1334763" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-fc96a3a749", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" } ] }, diff --git a/2021/22xxx/CVE-2021-22958.json b/2021/22xxx/CVE-2021-22958.json index a2358728286..a22b68a03a1 100644 --- a/2021/22xxx/CVE-2021-22958.json +++ b/2021/22xxx/CVE-2021-22958.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22958", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "https://github.com/concrete5/concrete5", + "version": { + "version_data": [ + { + "version_value": "Fixed in 8.5.5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Server-Side Request Forgery (SSRF) (CWE-918)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/863221", + "url": "https://hackerone.com/reports/863221" + }, + { + "refsource": "MISC", + "name": "https://documentation.concretecms.org/developers/introduction/version-history/855-release-notes", + "url": "https://documentation.concretecms.org/developers/introduction/version-history/855-release-notes" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.CVSSv2.0 AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" } ] } diff --git a/2021/23xxx/CVE-2021-23139.json b/2021/23xxx/CVE-2021-23139.json new file mode 100644 index 00000000000..a56edba7761 --- /dev/null +++ b/2021/23xxx/CVE-2021-23139.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23139", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23447.json b/2021/23xxx/CVE-2021-23447.json index e2ea80eca16..995847d78ef 100644 --- a/2021/23xxx/CVE-2021-23447.json +++ b/2021/23xxx/CVE-2021-23447.json @@ -3,16 +3,95 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-10-07T16:37:26.080019Z", "ID": "CVE-2021-23447", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cross-site Scripting (XSS)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "teddy", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "0.5.9" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-TEDDY-1579557", + "name": "https://snyk.io/vuln/SNYK-JS-TEDDY-1579557" + }, + { + "refsource": "MISC", + "url": "https://github.com/rooseveltframework/teddy/pull/518", + "name": "https://github.com/rooseveltframework/teddy/pull/518" + }, + { + "refsource": "MISC", + "url": "https://github.com/rooseveltframework/teddy/releases/tag/0.5.9", + "name": "https://github.com/rooseveltframework/teddy/releases/tag/0.5.9" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string)." } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Alessio Della Libera of Snyk Research Team" + } + ] } \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23855.json b/2021/23xxx/CVE-2021-23855.json index a788af3cf37..ebfe701fced 100644 --- a/2021/23xxx/CVE-2021-23855.json +++ b/2021/23xxx/CVE-2021-23855.json @@ -4,15 +4,81 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-23855", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@bosch.com", + "TITLE": "Information disclosure", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Rexroth", + "product": { + "product_data": [ + { + "product_name": "IndraMotion MLC IndraMotion XLC", + "version": { + "version_data": [ + { + "version_value": "All", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "name": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The user and password data base is exposed by an unprotected web server resource. Passwords are hashed with a weak hashing algorithm and therefore allow an attacker to determine the password by using rainbow tables." } ] + }, + "source": { + "advisory": "BOSCH-SA-741752 ", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23856.json b/2021/23xxx/CVE-2021-23856.json index 29d12855a5c..1c44f7526f8 100644 --- a/2021/23xxx/CVE-2021-23856.json +++ b/2021/23xxx/CVE-2021-23856.json @@ -4,15 +4,82 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-23856", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@bosch.com", + "DATE_PUBLIC": "2021-09-15", + "TITLE": "Reflected Cross-Site-Scripting", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Rexroth", + "product": { + "product_data": [ + { + "product_name": "IndraMotion MLC L20, L40", + "version": { + "version_data": [ + { + "version_value": "All", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10, + "baseSeverity": "CRITICAL" + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "name": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The web server is vulnerable to reflected XSS and therefore an attacker might be able to execute scripts on a client\u2019s computer by sending the client a manipulated URL." } ] + }, + "source": { + "advisory": "BOSCH-SA-741752 ", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23857.json b/2021/23xxx/CVE-2021-23857.json index 6dd890dad5b..f93ee029dfb 100644 --- a/2021/23xxx/CVE-2021-23857.json +++ b/2021/23xxx/CVE-2021-23857.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-23857", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@bosch.com", + "TITLE": "Login with hash", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Rexroth", + "product": { + "product_data": [ + { + "product_name": "IndraMotion MLC L25, L45, L65, L75, L85, XM21, XM22, XM41 and XM42 IndraMotion XLC", + "version": { + "version_data": [ + { + "version_value": "12 VRS", + "version_affected": ">=" + } + ] + } + }, + { + "product_name": "IndraMotion MLC L20, L40", + "version": { + "version_data": [ + { + "version_value": "12 VRS", + "version_affected": ">=" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-836 Use of Password Hash Instead of Password for Authentication" + } + ] + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10, + "baseSeverity": "CRITICAL" + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "name": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Login with hash: The login routine allows the client to log in to the system not by using the password, but by using the hash of the password. Combined with CVE-2021-23858, this allows an attacker to subsequently login to the system." } ] + }, + "source": { + "advisory": "BOSCH-SA-741752 ", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23858.json b/2021/23xxx/CVE-2021-23858.json index 6e1dd4116a1..a6b21aff7b6 100644 --- a/2021/23xxx/CVE-2021-23858.json +++ b/2021/23xxx/CVE-2021-23858.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-23858", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@bosch.com", + "TITLE": "Information disclosure", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Rexroth", + "product": { + "product_data": [ + { + "product_name": "IndraMotion MLC L25, L45, L65, L75, L85, XM21, XM22, XM41 and XM42 IndraControl XLC", + "version": { + "version_data": [ + { + "version_value": "12 VRS", + "version_affected": ">=" + } + ] + } + }, + { + "product_name": "IndraMotion MLC L20, L40", + "version": { + "version_data": [ + { + "version_value": "12 VRS", + "version_affected": ">=" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "name": "https://psirt.bosch.com/security-advisories/bosch-sa-741752.html", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Information disclosure: The main configuration, including users and their hashed passwords, is exposed by an unprotected web server resource and can be accessed without authentication. Additionally, device details are exposed which include the serial number and the firmware version by another unprotected web server resource." } ] + }, + "source": { + "advisory": "BOSCH-SA-741752 ", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23893.json b/2021/23xxx/CVE-2021-23893.json index bd2da05b3c0..d23ee6f0ea5 100644 --- a/2021/23xxx/CVE-2021-23893.json +++ b/2021/23xxx/CVE-2021-23893.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@mcafee.com", "ID": "CVE-2021-23893", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Privilege Escalation vulnerability in McAfee Drive Encryption (MDE)" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "McAfee Drive Encryption (MDE)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "7.3.0 HF1" + } + ] + } + } + ] + }, + "vendor_name": "McAfee,LLC" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Balazs Bucsay (@xoreipeip), Principal Security Consultant from NCC Group" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Privilege Escalation vulnerability in a Windows system driver of McAfee Drive Encryption (DE) prior to 7.3.0 could allow a local non-admin user to gain elevated system privileges via exploiting an unutilized memory buffer." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269: Improper Privilege Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10361", + "refsource": "CONFIRM", + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10361" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } -} \ No newline at end of file +} diff --git a/2021/24xxx/CVE-2021-24016.json b/2021/24xxx/CVE-2021-24016.json index be1f902830c..cfe6f39c837 100644 --- a/2021/24xxx/CVE-2021-24016.json +++ b/2021/24xxx/CVE-2021-24016.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-24016", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiManager", + "version": { + "version_data": [ + { + "version_value": "FortiManager 6.4.3, 6.2.7" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "High", + "attackVector": "Adjacent", + "availabilityImpact": "None", + "baseScore": 3.5, + "baseSeverity": "Low", + "confidentialityImpact": "Low", + "integrityImpact": "Low", + "privilegesRequired": "High", + "scope": "Changed", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N/E:P/RL:X/RC:X", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-190", + "url": "https://fortiguard.com/advisory/FG-IR-20-190" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of formula elements in a csv file in Fortinet FortiManager version 6.4.3 and below, 6.2.7 and below allows attacker to execute arbitrary commands via crafted IPv4 field in policy name, when exported as excel file and opened unsafely on the victim host." } ] } diff --git a/2021/24xxx/CVE-2021-24017.json b/2021/24xxx/CVE-2021-24017.json index 3b41308627c..377c49c200f 100644 --- a/2021/24xxx/CVE-2021-24017.json +++ b/2021/24xxx/CVE-2021-24017.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-24017", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiManager", + "version": { + "version_data": [ + { + "version_value": "FortiManager 6.4.3, 6.2.6" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "Low", + "baseScore": 5.4, + "baseSeverity": "Medium", + "confidentialityImpact": "None", + "integrityImpact": "Low", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:H/RL:X/RC:X", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-189", + "url": "https://fortiguard.com/advisory/FG-IR-20-189" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler." } ] } diff --git a/2021/24xxx/CVE-2021-24019.json b/2021/24xxx/CVE-2021-24019.json index 039ff7975ff..dccfc1ca8ac 100644 --- a/2021/24xxx/CVE-2021-24019.json +++ b/2021/24xxx/CVE-2021-24019.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-24019", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiClientEMS", + "version": { + "version_data": [ + { + "version_value": "FortiClientEMS 6.4.2, 6.4.1, 6.4.0, 6.2.8, 6.2.7, 6.2.6, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "High", + "attackVector": "Network", + "availabilityImpact": "High", + "baseScore": 7.9, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-072", + "url": "https://fortiguard.com/advisory/FG-IR-20-072" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)" } ] } diff --git a/2021/24xxx/CVE-2021-24021.json b/2021/24xxx/CVE-2021-24021.json index b98f5307a55..d6c82992f27 100644 --- a/2021/24xxx/CVE-2021-24021.json +++ b/2021/24xxx/CVE-2021-24021.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-24021", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiAnalyzer", + "version": { + "version_data": [ + { + "version_value": "FortiAnalyzer 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 4.2, + "baseSeverity": "Medium", + "confidentialityImpact": "None", + "integrityImpact": "Low", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:F/RL:X/RC:X", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-098", + "url": "https://fortiguard.com/advisory/FG-IR-20-098" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of input vulnerability [CWE-79] in FortiAnalyzer versions 6.4.3 and below, 6.2.7 and below and 6.0.10 and below may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the column settings of Logview in FortiAnalyzer, should the attacker be able to obtain that POST request, via other, hypothetical attacks." } ] } diff --git a/2021/24xxx/CVE-2021-24465.json b/2021/24xxx/CVE-2021-24465.json index 7df95fa5fb3..4b1c3f63948 100644 --- a/2021/24xxx/CVE-2021-24465.json +++ b/2021/24xxx/CVE-2021-24465.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24465", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24465", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Meow Gallery < 4.1.9 - Contributor+ SQL Injection" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Meow Gallery (+ Gallery Block)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.1.9", + "version_value": "4.1.9" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Meow Gallery WordPress plugin before 4.1.9 does not sanitise, validate or escape the ids attribute of its gallery shortcode (available for users as low as Contributor) before using it in an SQL statement, leading to an authenticated SQL Injection issue. The injection also allows the returned values to be manipulated in a way that could lead to data disclosure and arbitrary objects to be deserialized." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/08dbe202-0136-4502-87e7-5e984dc27b16", + "name": "https://wpscan.com/vulnerability/08dbe202-0136-4502-87e7-5e984dc27b16" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-89 SQL Injection", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "apple502j" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/24xxx/CVE-2021-24654.json b/2021/24xxx/CVE-2021-24654.json index 4b5b8d47ab7..410bd4ea513 100644 --- a/2021/24xxx/CVE-2021-24654.json +++ b/2021/24xxx/CVE-2021-24654.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24654", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24654", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "User Registration < 2.0.2 - Low Privilege Stored Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "User Registration – Custom Registration Form, Login And User Profile For WordPress", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.0.2", + "version_value": "2.0.2" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The User Registration WordPress plugin before 2.0.2 does not properly sanitise the user_registration_profile_pic_url value when submitted directly via the user_registration_update_profile_details AJAX action. This could allow any authenticated user, such as subscriber, to perform Stored Cross-Site attacks when their profile is viewed" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2", + "name": "https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "AyeCode Ltd" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/24xxx/CVE-2021-24673.json b/2021/24xxx/CVE-2021-24673.json index 542d4b7048c..6d26b0d2b47 100644 --- a/2021/24xxx/CVE-2021-24673.json +++ b/2021/24xxx/CVE-2021-24673.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24673", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24673", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Appointment Hour Booking < 1.3.16 - Authenticated Stored Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Appointment Hour Booking – WordPress Booking Plugin", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.3.16", + "version_value": "1.3.16" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Appointment Hour Booking WordPress plugin before 1.3.16 does not escape some of the Calendar Form settings, allowing high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/75a67932-d831-4dfb-a70d-a07650eaa755", + "name": "https://wpscan.com/vulnerability/75a67932-d831-4dfb-a70d-a07650eaa755" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Asif Nawaz Minhas" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/24xxx/CVE-2021-24676.json b/2021/24xxx/CVE-2021-24676.json index 4fcb6f88c96..690a40013a5 100644 --- a/2021/24xxx/CVE-2021-24676.json +++ b/2021/24xxx/CVE-2021-24676.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24676", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24676", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Better Find and Replace < 1.2.9 - Reflected Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Better Find and Replace", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.2.9", + "version_value": "1.2.9" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Better Find and Replace WordPress plugin before 1.2.9 does not escape the 's' GET parameter before outputting back in the All Masking Rules page, leading to a Reflected Cross-Site Scripting issue" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/59589e74-f901-4f4d-81de-26ad19d1b7fd", + "name": "https://wpscan.com/vulnerability/59589e74-f901-4f4d-81de-26ad19d1b7fd" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "apple502j" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/24xxx/CVE-2021-24678.json b/2021/24xxx/CVE-2021-24678.json index 03551322904..8c62f8c1459 100644 --- a/2021/24xxx/CVE-2021-24678.json +++ b/2021/24xxx/CVE-2021-24678.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24678", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24678", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "CM Tooltip Glossary < 3.9.21 - Contributor+ Stored Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "CM Tooltip Glossary – Better SEO and UEX for your WP site", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.9.21", + "version_value": "3.9.21" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The CM Tooltip Glossary WordPress plugin before 3.9.21 does not escape some glossary_tooltip shortcode attributes, which could allow users a role as low as Contributor to perform Stored Cross-Site Scripting attacks" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/b83880f7-8614-4409-9305-d059b5df15dd", + "name": "https://wpscan.com/vulnerability/b83880f7-8614-4409-9305-d059b5df15dd" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "apple502j" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/24xxx/CVE-2021-24679.json b/2021/24xxx/CVE-2021-24679.json index 703274194db..baaa6e88dcb 100644 --- a/2021/24xxx/CVE-2021-24679.json +++ b/2021/24xxx/CVE-2021-24679.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24679", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24679", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Bitcoin / AltCoin Payment Gateway for WooCommerce < 1.6.1 - Reflected Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Bitcoin / AltCoin Payment Gateway for WooCommerce & Multivendor store / shop", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.6.1", + "version_value": "1.6.1" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Bitcoin / AltCoin Payment Gateway for WooCommerce WordPress plugin before 1.6.1 does not escape the 's' GET parameter before outputting back in the All Masking Rules page, leading to a Reflected Cross-Site Scripting issue" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/7c6c0aac-1733-4abc-8e95-05416636a127", + "name": "https://wpscan.com/vulnerability/7c6c0aac-1733-4abc-8e95-05416636a127" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "apple502j" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/24xxx/CVE-2021-24687.json b/2021/24xxx/CVE-2021-24687.json index 0d7e4608afa..10975737375 100644 --- a/2021/24xxx/CVE-2021-24687.json +++ b/2021/24xxx/CVE-2021-24687.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24687", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24687", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Modern Events Calendar Lite < 5.22.2 - Admin+ Stored Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Modern Events Calendar Lite", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "5.22.2", + "version_value": "5.22.2" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Modern Events Calendar Lite WordPress plugin before 5.22.2 does not escape some of its settings before outputting them in attributes, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/300ba418-63ed-4c03-9031-263742ed522e", + "name": "https://wpscan.com/vulnerability/300ba418-63ed-4c03-9031-263742ed522e" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Shivam Rai" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/25xxx/CVE-2021-25270.json b/2021/25xxx/CVE-2021-25270.json index 7053fbe24de..d0d6882f461 100644 --- a/2021/25xxx/CVE-2021-25270.json +++ b/2021/25xxx/CVE-2021-25270.json @@ -4,15 +4,66 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-25270", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@sophos.com", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HitmanPro.Alert", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "901" + } + ] + } + } + ] + }, + "vendor_name": "Sophos" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Michael Bourque (@downwithupsec)" + } + ], "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A local attacker could execute arbitrary code with administrator privileges in HitmanPro.Alert before version Build 901." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmpa-lpe", + "refsource": "CONFIRM", + "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmpa-lpe" } ] } -} \ No newline at end of file +} diff --git a/2021/25xxx/CVE-2021-25271.json b/2021/25xxx/CVE-2021-25271.json index 03c54c87503..46f8243c953 100644 --- a/2021/25xxx/CVE-2021-25271.json +++ b/2021/25xxx/CVE-2021-25271.json @@ -4,15 +4,66 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-25271", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@sophos.com", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HitmanPro", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "318" + } + ] + } + } + ] + }, + "vendor_name": "Sophos" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Michael Bourque (@downwithupsec)" + } + ], "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe", + "refsource": "CONFIRM", + "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe" } ] } -} \ No newline at end of file +} diff --git a/2021/25xxx/CVE-2021-25467.json b/2021/25xxx/CVE-2021-25467.json index b5d16235198..36f64acf709 100644 --- a/2021/25xxx/CVE-2021-25467.json +++ b/2021/25xxx/CVE-2021-25467.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25467", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "R(11.0) devices with Exynos 980, 9830, 2100 chipsets", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Assuming system privilege is gained, possible buffer overflow vulnerabilities in the Vision DSP kernel driver prior to SMR Oct-2021 Release 1 allows privilege escalation to Root by hijacking loaded library." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25468.json b/2021/25xxx/CVE-2021-25468.json index fb8f83c7806..3529050723d 100644 --- a/2021/25xxx/CVE-2021-25468.json +++ b/2021/25xxx/CVE-2021-25468.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25468", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Select Q(10.0), R(11.0) devices with Exynos chipsets", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible guessing and confirming a byte memory vulnerability in Widevine trustlet prior to SMR Oct-2021 Release 1 allows attackers to read arbitrary memory address." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25469.json b/2021/25xxx/CVE-2021-25469.json index aa32d8d0dbd..0702232f23d 100644 --- a/2021/25xxx/CVE-2021-25469.json +++ b/2021/25xxx/CVE-2021-25469.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25469", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Select Q(10.0), R(11.0) devices with Exynos chipsets", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible stack-based buffer overflow vulnerability in Widevine trustlet prior to SMR Oct-2021 Release 1 allows arbitrary code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25470.json b/2021/25xxx/CVE-2021-25470.json index 17bfb232965..ecdc9eab174 100644 --- a/2021/25xxx/CVE-2021-25470.json +++ b/2021/25xxx/CVE-2021-25470.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25470", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Select P(9.0), Q(10.0), R(11.0) devices with Exynos and Mediatek chipsets", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper caller check logic of SMC call in TEEGRIS secure OS prior to SMR Oct-2021 Release 1 can be used to compromise TEE." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 7.9, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94: Improper Control of Generation of Code" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25471.json b/2021/25xxx/CVE-2021-25471.json index 93d666eef56..0eae8cc483e 100644 --- a/2021/25xxx/CVE-2021-25471.json +++ b/2021/25xxx/CVE-2021-25471.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25471", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0) devices with Exynos CP chipsets", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A lack of replay attack protection in Security Mode Command process prior to SMR Oct-2021 Release 1 can lead to denial of service on mobile network connection and battery depletion." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 3.7, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25472.json b/2021/25xxx/CVE-2021-25472.json index 8ea5d883bd9..58e58ce84bc 100644 --- a/2021/25xxx/CVE-2021-25472.json +++ b/2021/25xxx/CVE-2021-25472.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25472", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper access control vulnerability in BluetoothSettingsProvider prior to SMR Oct-2021 Release 1 allows untrusted application to overwrite some Bluetooth information." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-264 Permissions, Privileges, and Access Controls" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25473.json b/2021/25xxx/CVE-2021-25473.json index ab539cca83d..aa6a85b23ae 100644 --- a/2021/25xxx/CVE-2021-25473.json +++ b/2021/25xxx/CVE-2021-25473.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25473", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Assuming a shell privilege is gained, an improper exception handling for multi_sim_bar_hide_by_meadia_full value in SystemUI prior to SMR Oct-2021 Release 1 allows an attacker to cause a permanent denial of service in user device before factory reset." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-755 Improper Handling of Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25474.json b/2021/25xxx/CVE-2021-25474.json index 70de7a10dbb..cb4bf6f289d 100644 --- a/2021/25xxx/CVE-2021-25474.json +++ b/2021/25xxx/CVE-2021-25474.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25474", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Assuming a shell privilege is gained, an improper exception handling for multi_sim_bar_show_on_qspanel value in SystemUI prior to SMR Oct-2021 Release 1 allows an attacker to cause a permanent denial of service in user device before factory reset." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-755 Improper Handling of Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25475.json b/2021/25xxx/CVE-2021-25475.json index 25ea29dd8a5..8a860d257d3 100644 --- a/2021/25xxx/CVE-2021-25475.json +++ b/2021/25xxx/CVE-2021-25475.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25475", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Q(10.0), R(11.0) ", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible heap-based buffer overflow vulnerability in DSP kernel driver prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.9, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122: Heap-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25476.json b/2021/25xxx/CVE-2021-25476.json index 46e2c8fd493..046099dde19 100644 --- a/2021/25xxx/CVE-2021-25476.json +++ b/2021/25xxx/CVE-2021-25476.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25476", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Select Q(10.0), R(11.0) devices with Exynos chipsets", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An information disclosure vulnerability in Widevine TA log prior to SMR Oct-2021 Release 1 allows attackers to bypass the ASLR protection mechanism in TEE." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1295: Debug Messages Revealing Unnecessary Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25477.json b/2021/25xxx/CVE-2021-25477.json index 0ff09a5803e..5d47a90420f 100644 --- a/2021/25xxx/CVE-2021-25477.json +++ b/2021/25xxx/CVE-2021-25477.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25477", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper error handling in Mediatek RRC Protocol stack prior to SMR Oct-2021 Release 1 allows modem crash and remote denial of service." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-415: Double Free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25478.json b/2021/25xxx/CVE-2021-25478.json index e949140dfbf..75301382e0f 100644 --- a/2021/25xxx/CVE-2021-25478.json +++ b/2021/25xxx/CVE-2021-25478.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25478", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0) ", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible stack-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121: Stack-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25479.json b/2021/25xxx/CVE-2021-25479.json index 0c875f723ed..c520bb531ca 100644 --- a/2021/25xxx/CVE-2021-25479.json +++ b/2021/25xxx/CVE-2021-25479.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25479", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible heap-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122: Heap-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25480.json b/2021/25xxx/CVE-2021-25480.json index e9abb439bb9..4e60cddce29 100644 --- a/2021/25xxx/CVE-2021-25480.json +++ b/2021/25xxx/CVE-2021-25480.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25480", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0) ", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A lack of replay attack protection in GUTI REALLOCATION COMMAND message process in Qualcomm modem prior to SMR Oct-2021 Release 1 can lead to remote denial of service on mobile network connection." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-294: Authentication Bypass by Capture-replay" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25481.json b/2021/25xxx/CVE-2021-25481.json index 3df2b519095..8d30c821e9b 100644 --- a/2021/25xxx/CVE-2021-25481.json +++ b/2021/25xxx/CVE-2021-25481.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25481", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper error handling in Exynos CP booting driver prior to SMR Oct-2021 Release 1 allows local attackers to bypass a Secure Memory Protector of Exynos CP Memory." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754: Improper Check for Unusual or Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25482.json b/2021/25xxx/CVE-2021-25482.json index 5c8e78dbaed..79f7072ed29 100644 --- a/2021/25xxx/CVE-2021-25482.json +++ b/2021/25xxx/CVE-2021-25482.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25482", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection vulnerabilities in CMFA framework prior to SMR Oct-2021 Release 1 allow untrusted application to overwrite some CMFA framework information." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-264 Permissions, Privileges, and Access Controls" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25483.json b/2021/25xxx/CVE-2021-25483.json index d006d9adbb2..caa39611ecf 100644 --- a/2021/25xxx/CVE-2021-25483.json +++ b/2021/25xxx/CVE-2021-25483.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25483", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lack of boundary checking of a buffer in livfivextractor library prior to SMR Oct-2021 Release 1 allows OOB read." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": " CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25484.json b/2021/25xxx/CVE-2021-25484.json index fe4dd0e2b1c..2fbbf876b70 100644 --- a/2021/25xxx/CVE-2021-25484.json +++ b/2021/25xxx/CVE-2021-25484.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25484", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1 go), Q(10.0 go), R(11.0 go)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper authentication in InputManagerService prior to SMR Oct-2021 Release 1 allows monitoring the touch event." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": " CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25485.json b/2021/25xxx/CVE-2021-25485.json index e194bd7f488..fc2cc81756c 100644 --- a/2021/25xxx/CVE-2021-25485.json +++ b/2021/25xxx/CVE-2021-25485.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25485", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Path traversal vulnerability in FactoryAirCommnadManger prior to SMR Oct-2021 Release 1 allows attackers to write file as system UID via BT remote socket." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25486.json b/2021/25xxx/CVE-2021-25486.json index 7422165e0af..01a96579cb8 100644 --- a/2021/25xxx/CVE-2021-25486.json +++ b/2021/25xxx/CVE-2021-25486.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25486", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exposure of information vulnerability in ipcdump prior to SMR Oct-2021 Release 1 allows an attacker detect device information via analyzing packet in log." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 2.5, + "baseSeverity": "Low", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25487.json b/2021/25xxx/CVE-2021-25487.json index ab07e91636f..a690fecb702 100644 --- a/2021/25xxx/CVE-2021-25487.json +++ b/2021/25xxx/CVE-2021-25487.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25487", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lack of boundary checking of a buffer in set_skb_priv() of modem interface driver prior to SMR Oct-2021 Release 1 allows OOB read and it results in arbitrary code execution by dereference of invalid function pointer." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25488.json b/2021/25xxx/CVE-2021-25488.json index 0be8c9e5182..5f711e80534 100644 --- a/2021/25xxx/CVE-2021-25488.json +++ b/2021/25xxx/CVE-2021-25488.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25488", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lack of boundary checking of a buffer in recv_data() of modem interface driver prior to SMR Oct-2021 Release 1 allows OOB read." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25489.json b/2021/25xxx/CVE-2021-25489.json index d347364cfd2..0801ec681e0 100644 --- a/2021/25xxx/CVE-2021-25489.json +++ b/2021/25xxx/CVE-2021-25489.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25489", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.1), P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Assuming radio permission is gained, missing input validation in modem interface driver prior to SMR Oct-2021 Release 1 results in format string bug leading to kernel panic." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25490.json b/2021/25xxx/CVE-2021-25490.json index 71e3b7951aa..376a7a76135 100644 --- a/2021/25xxx/CVE-2021-25490.json +++ b/2021/25xxx/CVE-2021-25490.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25490", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A keyblob downgrade attack in keymaster prior to SMR Oct-2021 Release 1 allows attacker to trigger IV reuse vulnerability with privileged process." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25491.json b/2021/25xxx/CVE-2021-25491.json index 4fb33bb8ddb..e140c66b712 100644 --- a/2021/25xxx/CVE-2021-25491.json +++ b/2021/25xxx/CVE-2021-25491.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25491", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Oct-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in mfc driver prior to SMR Oct-2021 Release 1 allows memory corruption via NULL-pointer dereference." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 2.3, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476: Null Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25492.json b/2021/25xxx/CVE-2021-25492.json index 424e13130d0..f4f5e65a888 100644 --- a/2021/25xxx/CVE-2021-25492.json +++ b/2021/25xxx/CVE-2021-25492.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25492", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Notes", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.3.02.61" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lack of boundary checking of a buffer in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows OOB read." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25493.json b/2021/25xxx/CVE-2021-25493.json index 658b875e502..9bbb1bae53d 100644 --- a/2021/25xxx/CVE-2021-25493.json +++ b/2021/25xxx/CVE-2021-25493.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25493", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Notes", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.3.02.61" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lack of boundary checking of a buffer in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows OOB read" } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25494.json b/2021/25xxx/CVE-2021-25494.json index 3bc1101649b..c7af1140d6c 100644 --- a/2021/25xxx/CVE-2021-25494.json +++ b/2021/25xxx/CVE-2021-25494.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25494", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Notes", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.3.02.61" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25495.json b/2021/25xxx/CVE-2021-25495.json index aa616125310..134a22d753f 100644 --- a/2021/25xxx/CVE-2021-25495.json +++ b/2021/25xxx/CVE-2021-25495.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25495", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Notes", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.3.02.61" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible heap buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122: Heap-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25496.json b/2021/25xxx/CVE-2021-25496.json index 469bf071be0..ab71d03e5d0 100644 --- a/2021/25xxx/CVE-2021-25496.json +++ b/2021/25xxx/CVE-2021-25496.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25496", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Notes", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.3.02.61" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible buffer overflow vulnerability in maetd_dec_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25497.json b/2021/25xxx/CVE-2021-25497.json index 12ffc1bd9c7..8b3394b4e4f 100644 --- a/2021/25xxx/CVE-2021-25497.json +++ b/2021/25xxx/CVE-2021-25497.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25497", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Notes", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.3.02.61" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible buffer overflow vulnerability in maetd_cpy_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25498.json b/2021/25xxx/CVE-2021-25498.json index 2c3a066c6b4..c4961d71d64 100644 --- a/2021/25xxx/CVE-2021-25498.json +++ b/2021/25xxx/CVE-2021-25498.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25498", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Notes", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.3.02.61" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible buffer overflow vulnerability in maetd_eco_cb_mode of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25499.json b/2021/25xxx/CVE-2021-25499.json index 576fa50cd7f..7660365661e 100644 --- a/2021/25xxx/CVE-2021-25499.json +++ b/2021/25xxx/CVE-2021-25499.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25499", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Galaxy Store", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "-", + "version_value": "4.5.32.4" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Intent redirection vulnerability in SamsungAccountSDKSigninActivity of Galaxy Store prior to version 4.5.32.4 allows attacker to access content provider of Galaxy Store." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10", + "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25737.json b/2021/25xxx/CVE-2021-25737.json index d63a4b6758d..a6b8bfd7fca 100644 --- a/2021/25xxx/CVE-2021-25737.json +++ b/2021/25xxx/CVE-2021-25737.json @@ -101,6 +101,11 @@ "refsource": "MISC", "url": "https://github.com/kubernetes/kubernetes/issues/102106", "name": "https://github.com/kubernetes/kubernetes/issues/102106" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211004-0004/", + "url": "https://security.netapp.com/advisory/ntap-20211004-0004/" } ] }, diff --git a/2021/25xxx/CVE-2021-25741.json b/2021/25xxx/CVE-2021-25741.json index c60f3c834ba..cac9e5adfb3 100644 --- a/2021/25xxx/CVE-2021-25741.json +++ b/2021/25xxx/CVE-2021-25741.json @@ -101,6 +101,11 @@ "refsource": "MISC", "url": "https://github.com/kubernetes/kubernetes/issues/104980", "name": "https://github.com/kubernetes/kubernetes/issues/104980" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0006/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0006/" } ] }, diff --git a/2021/25xxx/CVE-2021-25964.json b/2021/25xxx/CVE-2021-25964.json index a171092e39d..f28cc815968 100644 --- a/2021/25xxx/CVE-2021-25964.json +++ b/2021/25xxx/CVE-2021-25964.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "DATE_PUBLIC": "2021-10-02T14:38:00.000Z", "ID": "CVE-2021-25964", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored Cross-Site Scripting (XSS) in Calibre-web via Description Field in Metadata" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "calibreweb", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0.6.0" + }, + { + "version_affected": "<=", + "version_value": "0.6.12" + } + ] + } + } + ] + }, + "vendor_name": "OzzieIsaacs" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In \u201cCalibre-web\u201d application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in \u201cMetadata\u201d. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964" + }, + { + "refsource": "MISC", + "url": "https://github.com/janeczku/calibre-web/commit/32e27712f0f71fdec646add20cd78b4ce75acfce", + "name": "https://github.com/janeczku/calibre-web/commit/32e27712f0f71fdec646add20cd78b4ce75acfce" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to 0.6.13" + } + ], + "source": { + "advisory": "https://www.whitesourcesoftware.com/vulnerability-database/", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26085.json b/2021/26xxx/CVE-2021-26085.json index a9b01ef8d77..0cab3a9a323 100644 --- a/2021/26xxx/CVE-2021-26085.json +++ b/2021/26xxx/CVE-2021-26085.json @@ -85,6 +85,11 @@ "url": "https://jira.atlassian.com/browse/CONFSERVER-67893", "refsource": "MISC", "name": "https://jira.atlassian.com/browse/CONFSERVER-67893" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html", + "url": "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html" } ] } diff --git a/2021/26xxx/CVE-2021-26086.json b/2021/26xxx/CVE-2021-26086.json index a39aef1377c..7a53aee93cd 100644 --- a/2021/26xxx/CVE-2021-26086.json +++ b/2021/26xxx/CVE-2021-26086.json @@ -101,6 +101,11 @@ "url": "https://jira.atlassian.com/browse/JRASERVER-72695", "refsource": "MISC", "name": "https://jira.atlassian.com/browse/JRASERVER-72695" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html", + "url": "http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html" } ] } diff --git a/2021/26xxx/CVE-2021-26556.json b/2021/26xxx/CVE-2021-26556.json index 620801b7ba7..8f4b7dd6807 100644 --- a/2021/26xxx/CVE-2021-26556.json +++ b/2021/26xxx/CVE-2021-26556.json @@ -3,15 +3,72 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@octopus.com", "ID": "CVE-2021-26556", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Octopus Deploy", + "product": { + "product_data": [ + { + "product_name": "Octopus Server", + "version": { + "version_data": [ + { + "version_value": ">=", + "version_affected": "0.9" + }, + { + "version_value": "<", + "version_affected": "2020.4.229" + }, + { + "version_value": ">=", + "version_affected": "2020.5.0" + }, + { + "version_value": "<", + "version_affected": "2020.5.256" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Local privilege escalation in Octopus Server (Windows)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://advisories.octopus.com/adv/2021-01---Local-privilege-escalation-in-Octopus-Server-(CVE-2021-26556).1733296189.html", + "refsource": "MISC", + "name": "https://advisories.octopus.com/adv/2021-01---Local-privilege-escalation-in-Octopus-Server-(CVE-2021-26556).1733296189.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access." } ] } diff --git a/2021/26xxx/CVE-2021-26557.json b/2021/26xxx/CVE-2021-26557.json index ac03a028bb9..1e5b7030cd3 100644 --- a/2021/26xxx/CVE-2021-26557.json +++ b/2021/26xxx/CVE-2021-26557.json @@ -3,15 +3,64 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@octopus.com", "ID": "CVE-2021-26557", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Octopus Deploy", + "product": { + "product_data": [ + { + "product_name": "Octopus Tentacle", + "version": { + "version_data": [ + { + "version_value": ">=", + "version_affected": "3.15.4" + }, + { + "version_value": "<", + "version_affected": "6.0.489" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Local privilege escalation in Octopus Tentacle (Windows)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://advisories.octopus.com/adv/2021-02---Local-privilege-escalation-in-Octopus-Tentacle-(CVE-2021-26557).1732870264.html", + "refsource": "MISC", + "name": "https://advisories.octopus.com/adv/2021-02---Local-privilege-escalation-in-Octopus-Tentacle-(CVE-2021-26557).1732870264.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When Octopus Tentacle is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access." } ] } diff --git a/2021/27xxx/CVE-2021-27034.json b/2021/27xxx/CVE-2021-27034.json index bc138deee62..bd2c751a0e5 100644 --- a/2021/27xxx/CVE-2021-27034.json +++ b/2021/27xxx/CVE-2021-27034.json @@ -48,6 +48,46 @@ "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/" } ] }, diff --git a/2021/27xxx/CVE-2021-27035.json b/2021/27xxx/CVE-2021-27035.json index 566bede993d..72761c0df78 100644 --- a/2021/27xxx/CVE-2021-27035.json +++ b/2021/27xxx/CVE-2021-27035.json @@ -48,6 +48,41 @@ "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1136/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1136/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1140/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1140/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1137/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1137/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1133/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1133/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1139/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1139/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1135/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1135/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1134/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1134/" } ] }, diff --git a/2021/27xxx/CVE-2021-27036.json b/2021/27xxx/CVE-2021-27036.json index bf6356913df..92cc716476c 100644 --- a/2021/27xxx/CVE-2021-27036.json +++ b/2021/27xxx/CVE-2021-27036.json @@ -48,6 +48,26 @@ "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1142/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1142/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1143/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1143/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1138/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1138/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1141/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1141/" } ] }, diff --git a/2021/28xxx/CVE-2021-28116.json b/2021/28xxx/CVE-2021-28116.json index 976f1d1f680..2a132c10363 100644 --- a/2021/28xxx/CVE-2021-28116.json +++ b/2021/28xxx/CVE-2021-28116.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-24af72ff2c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211004 CVE-2021-28116 / ZDI-CAN-11610 / SQUID-2020:12 Out-Of-Bounds memory access in WCCPv2", + "url": "http://www.openwall.com/lists/oss-security/2021/10/04/1" } ] }, diff --git a/2021/28xxx/CVE-2021-28129.json b/2021/28xxx/CVE-2021-28129.json index 363e447b3c7..4b8e348bde8 100644 --- a/2021/28xxx/CVE-2021-28129.json +++ b/2021/28xxx/CVE-2021-28129.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-28129", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache OpenOffice", + "version": { + "version_data": [ + { + "platform": "Linux DEB installs", + "version_affected": "=", + "version_name": "Apache OpenOffice", + "version_value": "4.1.8" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Arrigo Marchiori" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "While working on Apache OpenOffice 4.1.8 a developer discovered that the DEB package did not install using root, but instead used a userid and groupid of 500. This both caused issues with desktop integration and could allow a crafted attack on files owned by that user or group if they exist. Users who installed the Apache OpenOffice 4.1.8 DEB packaging should upgrade to the latest version of Apache OpenOffice." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": [ + { + "other": "low" + } + ], + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E", + "name": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", + "url": "https://lists.apache.org/thread.html/r9e72234dd662280fa1a3cca6164d3470a1dbc0d8e53e48ba27f787ce@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[openoffice-users] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", + "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b@%3Cusers.openoffice.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/5" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28163.json b/2021/28xxx/CVE-2021-28163.json index 73cae3ffb3b..bf08d4c9c84 100644 --- a/2021/28xxx/CVE-2021-28163.json +++ b/2021/28xxx/CVE-2021-28163.json @@ -189,6 +189,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E" } ] } diff --git a/2021/28xxx/CVE-2021-28169.json b/2021/28xxx/CVE-2021-28169.json index 89ed8d2428f..dd4b1c33721 100644 --- a/2021/28xxx/CVE-2021-28169.json +++ b/2021/28xxx/CVE-2021-28169.json @@ -167,6 +167,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E" } ] } diff --git a/2021/28xxx/CVE-2021-28661.json b/2021/28xxx/CVE-2021-28661.json index e44f5426804..4df2b2c9a48 100644 --- a/2021/28xxx/CVE-2021-28661.json +++ b/2021/28xxx/CVE-2021-28661.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28661", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28661", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/silverstripe/silverstripe-graphql/releases", + "refsource": "MISC", + "name": "https://github.com/silverstripe/silverstripe-graphql/releases" + }, + { + "refsource": "MISC", + "name": "https://www.silverstripe.org/download/security-releases/CVE-2021-28661", + "url": "https://www.silverstripe.org/download/security-releases/CVE-2021-28661" } ] } diff --git a/2021/28xxx/CVE-2021-28702.json b/2021/28xxx/CVE-2021-28702.json index 7f93925b706..46fd0a20a62 100644 --- a/2021/28xxx/CVE-2021-28702.json +++ b/2021/28xxx/CVE-2021-28702.json @@ -1,18 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@xen.org", "ID": "CVE-2021-28702", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "xen", + "version": { + "version_data": [ + { + "version_affected": "?<", + "version_value": "4.12" + }, + { + "version_affected": ">=", + "version_value": "4.12.x" + }, + { + "version_affected": "!>", + "version_value": "xen-unstable" + } + ] + } + } + ] + }, + "vendor_name": "Xen" + } + ] + } + }, + "configuration": { + "configuration_data": { + "description": { + "description_data": [ + { + "lang": "eng", + "value": "All versions of Xen from at least 4.4 onwards are vulnerable.\n\nOnly Intel x86 systems are affected. AMD x86 systems, and Arm\nsystems, are all unaffected.\n\nOnly systems using PCI passthrough are affected. (And then, only if\nthe assigned devices have RMRRs, but whether a device advertises RMRRs\nis not easy to discern.)" + } + ] + } + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption." } ] + }, + "impact": { + "impact_data": { + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Administrators of guests which have been assigned RMRR-using PCI\ndevices can cause denial of service and other problems, possibly\nincluding escalation of privilege." + } + ] + } + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "unknown" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xenproject.org/xsa/advisory-386.txt", + "refsource": "MISC", + "name": "https://xenbits.xenproject.org/xsa/advisory-386.txt" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 Xen Security Advisory 386 v2 (CVE-2021-28702) - PCI devices with RMRRs not deassigned correctly", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/2" + } + ] + }, + "workaround": { + "workaround_data": { + "description": { + "description_data": [ + { + "lang": "eng", + "value": "There is no mitigation (other than not passing through PCI devices\nwith RMRRs to guests)." + } + ] + } + } } } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29063.json b/2021/29xxx/CVE-2021-29063.json index 7699c724559..79544bc4de0 100644 --- a/2021/29xxx/CVE-2021-29063.json +++ b/2021/29xxx/CVE-2021-29063.json @@ -71,6 +71,16 @@ "refsource": "MISC", "name": "https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md", "url": "https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-fc30c0de34", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3M5O55E7VUDMXCPQR6MQTOIFDKHP36AA/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-244a18163c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MS2U6GLXQSRZJE2HVUAUMVFR2DWQLCZG/" } ] } diff --git a/2021/29xxx/CVE-2021-29108.json b/2021/29xxx/CVE-2021-29108.json index a4937b5ca8c..308992ca000 100644 --- a/2021/29xxx/CVE-2021-29108.json +++ b/2021/29xxx/CVE-2021-29108.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@esri.com", + "DATE_PUBLIC": "2021-07-15T18:34:00.000Z", "ID": "CVE-2021-29108", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below." }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Portal for ArcGIS", + "version": { + "version_data": [ + { + "platform": ".64", + "version_affected": "<=", + "version_name": "All", + "version_value": "10.9" + } + ] + } + } + ] + }, + "vendor_name": "Esri" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below that may allow a remote, authenticated attacker to impersonate another account." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.8" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-347 Improper Verification of Cryptographic Signature" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/", + "refsource": "CONFIRM", + "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/" + } + ] + }, + "source": { + "defect": [ + "BUG-000139216", + "" + ], + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29109.json b/2021/29xxx/CVE-2021-29109.json index 92b5ee88f13..d1d066a25a9 100644 --- a/2021/29xxx/CVE-2021-29109.json +++ b/2021/29xxx/CVE-2021-29109.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@esri.com", + "DATE_PUBLIC": "2021-07-15T18:35:00.000Z", "ID": "CVE-2021-29109", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "A reflected XSS vulnerability in Esri Portal for ArcGIS version 10.9." }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Portal for ArcGIS", + "version": { + "version_data": [ + { + "platform": "x64", + "version_affected": "<=", + "version_name": "All", + "version_value": "10.9" + } + ] + } + } + ] + }, + "vendor_name": "Esri" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected XSS vulnerability in Esri Portal for ArcGIS version 10.9 and below may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the user\u2019s browser." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.8" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/", + "refsource": "CONFIRM", + "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/" + } + ] + }, + "source": { + "defect": [ + "BUG-000138525", + "" + ], + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29110.json b/2021/29xxx/CVE-2021-29110.json index 2072ea661f9..8c63147db37 100644 --- a/2021/29xxx/CVE-2021-29110.json +++ b/2021/29xxx/CVE-2021-29110.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@esri.com", + "DATE_PUBLIC": "2021-07-15T18:39:00.000Z", "ID": "CVE-2021-29110", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored cross-site scripting (XSS) issue in Esri Portal for ArcGIS may allow a remote unauthenticated attacker to pass and store malicious strings in the home application." }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Portal for ArcGIS", + "version": { + "version_data": [ + { + "platform": "x64", + "version_affected": "<=", + "version_name": "All", + "version_value": "10.9" + } + ] + } + } + ] + }, + "vendor_name": "Esri" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting (XSS) issue in Esri Portal for ArcGIS may allow a remote unauthenticated attacker to pass and store malicious strings in the home application." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.8" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/", + "refsource": "CONFIRM", + "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/Portal-for-ArcGIS-Security-2021-Update-1-Patch/" + } + ] + }, + "source": { + "defect": [ + "BUG-000136493", + "" + ], + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29262.json b/2021/29xxx/CVE-2021-29262.json index d34e2328205..26743d18b82 100644 --- a/2021/29xxx/CVE-2021-29262.json +++ b/2021/29xxx/CVE-2021-29262.json @@ -118,6 +118,11 @@ "refsource": "MLIST", "name": "[jackrabbit-oak-issues] 20210730 [jira] [Commented] (OAK-9520) CVE-2021-29262 in oak-solr-osgi", "url": "https://lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[jackrabbit-oak-issues] 20211006 [jira] [Updated] (OAK-9520) CVE-2021-29262 in oak-solr-osgi", + "url": "https://lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3E" } ] }, diff --git a/2021/29xxx/CVE-2021-29700.json b/2021/29xxx/CVE-2021-29700.json index 6228a2c0718..3026cc90d45 100644 --- a/2021/29xxx/CVE-2021-29700.json +++ b/2021/29xxx/CVE-2021-29700.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-29700", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authneticated attacker to obtain sensitive information from configuration files that could aid in further attacks against the system. IBM X-Force ID: 200656.", + "lang": "eng" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6496749", + "title": "IBM Security Bulletin 6496749 (Sterling B2B Integrator)", + "name": "https://www.ibm.com/support/pages/node/6496749", + "refsource": "CONFIRM" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-sterling-cve202129700-info-disc (200656)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/200656" + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "AV": "N", + "I": "N", + "PR": "L", + "SCORE": "4.300", + "AC": "L", + "C": "L", + "S": "U", + "UI": "N", + "A": "N" + } + } + }, + "data_version": "4.0", + "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-06T00:00:00", + "ID": "CVE-2021-29700", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator", + "version": { + "version_data": [ + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.1.0.2" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "5.2.6.5_4" + }, + { + "version_value": "6.0.0.6" + } + ] + } + } + ] + } + } + ] + } } } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29758.json b/2021/29xxx/CVE-2021-29758.json index a23873fb3bf..26f59db228b 100644 --- a/2021/29xxx/CVE-2021-29758.json +++ b/2021/29xxx/CVE-2021-29758.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-29758", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Gain Access", + "lang": "eng" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6495969", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6495969", + "title": "IBM Security Bulletin 6495969 (Sterling B2B Integrator)" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/202169", + "refsource": "XF", + "name": "ibm-sterling-cve202129758-access-control (202169)" + } + ] }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to perform actions that they should not be able to access due to improper access controls. IBM X-Force ID: 202169.", + "lang": "eng" } ] - } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator", + "version": { + "version_data": [ + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + }, + { + "version_value": "5.2.6.5_4" + }, + { + "version_value": "6.0.0.6" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "BM": { + "C": "N", + "AC": "L", + "S": "U", + "I": "L", + "AV": "N", + "UI": "N", + "SCORE": "4.300", + "PR": "L", + "A": "N" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-29758", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC" + }, + "data_type": "CVE" } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29760.json b/2021/29xxx/CVE-2021-29760.json index 35a2f1715d7..f644bfcd7e1 100644 --- a/2021/29xxx/CVE-2021-29760.json +++ b/2021/29xxx/CVE-2021-29760.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-29760", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "A": "N", + "PR": "L", + "SCORE": "5.400", + "UI": "N", + "I": "L", + "AV": "N", + "S": "U", + "AC": "L", + "C": "L" + } + } }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to download unauthorized files through the dashboard user interface. IBM X-Force ID: 202213.", + "lang": "eng" } ] + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6495969 (Sterling B2B Integrator)", + "name": "https://www.ibm.com/support/pages/node/6495969", + "url": "https://www.ibm.com/support/pages/node/6495969", + "refsource": "CONFIRM" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/202213", + "name": "ibm-sterling-cve202129760-file-download (202213)" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + }, + { + "version_value": "5.2.6.5_4" + }, + { + "version_value": "6.0.0.6" + } + ] + }, + "product_name": "Sterling B2B Integrator" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-29760", + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC" } } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29761.json b/2021/29xxx/CVE-2021-29761.json index 12598b2cc19..3a21a6da87a 100644 --- a/2021/29xxx/CVE-2021-29761.json +++ b/2021/29xxx/CVE-2021-29761.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", - "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-29761", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "SCORE": "4.300", + "PR": "L", + "A": "N", + "C": "L", + "AC": "L", + "S": "U", + "UI": "N", + "I": "N", + "AV": "N" + } + } }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to obtain sensitive information from the dashboard that they should not have access to. IBM X-Force ID: 202265.", + "lang": "eng" } ] - } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6495969 (Sterling B2B Integrator)", + "url": "https://www.ibm.com/support/pages/node/6495969", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6495969" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/202265", + "name": "ibm-sterling-cve202129761-info-disc (202265)", + "title": "X-Force Vulnerability Report" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator", + "version": { + "version_data": [ + { + "version_value": "6.0.0.0" + }, + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + }, + { + "version_value": "5.2.6.5_4" + }, + { + "version_value": "6.0.0.6" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_type": "CVE", + "CVE_data_meta": { + "ID": "CVE-2021-29761", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "data_format": "MITRE" } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29764.json b/2021/29xxx/CVE-2021-29764.json index 1afa5ed7461..2d2ff92ed41 100644 --- a/2021/29xxx/CVE-2021-29764.json +++ b/2021/29xxx/CVE-2021-29764.json @@ -1,18 +1,99 @@ { "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-29764", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC" + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "H", + "RC": "C" + }, + "BM": { + "A": "N", + "PR": "L", + "SCORE": "6.400", + "S": "C", + "I": "L", + "AV": "N", + "UI": "N", + "C": "L", + "AC": "L" + } + } + }, + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + } + ] + }, + "product_name": "Sterling B2B Integrator" + } + ] + } + } + ] + } }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 202268.", + "lang": "eng" } ] - } + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6495967", + "url": "https://www.ibm.com/support/pages/node/6495967", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6495967 (Sterling B2B Integrator)" + }, + { + "name": "ibm-sterling-cve202129764-xss (202268)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268", + "refsource": "XF", + "title": "X-Force Vulnerability Report" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "data_format": "MITRE" } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29798.json b/2021/29xxx/CVE-2021-29798.json index a72cc47462f..fbab8539914 100644 --- a/2021/29xxx/CVE-2021-29798.json +++ b/2021/29xxx/CVE-2021-29798.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Data Manipulation" + } + ] + } + ] + }, "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-10-05T00:00:00", "ID": "CVE-2021-29798", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com" + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator", + "version": { + "version_data": [ + { + "version_value": "6.0.0.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 203734." } ] - } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6495925 (Sterling B2B Integrator)", + "name": "https://www.ibm.com/support/pages/node/6495925", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6495925" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/203734", + "name": "ibm-sterling-cve202129798-sql-injection (203734)", + "title": "X-Force Vulnerability Report" + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "UI": "N", + "AV": "N", + "I": "L", + "S": "U", + "AC": "L", + "C": "L", + "A": "L", + "PR": "L", + "SCORE": "6.300" + } + } + }, + "data_version": "4.0" } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29836.json b/2021/29xxx/CVE-2021-29836.json index ff962537985..ca8cf6a8085 100644 --- a/2021/29xxx/CVE-2021-29836.json +++ b/2021/29xxx/CVE-2021-29836.json @@ -1,17 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29836", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-29836" }, + "data_type": "CVE", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204912." + } + ] + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6495921 (Sterling B2B Integrator)", + "url": "https://www.ibm.com/support/pages/node/6495921", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6495921" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-sterling-cve202129836-xss (204912)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/204912", + "refsource": "XF" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.0.0" + }, + { + "version_value": "6.0.1.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + }, + { + "version_value": "5.2.6.5_4" + }, + { + "version_value": "6.0.0.6" + }, + { + "version_value": "2.2.0.0" + } + ] + }, + "product_name": "Sterling B2B Integrator" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "impact": { + "cvssv3": { + "BM": { + "SCORE": "5.400", + "PR": "L", + "A": "N", + "C": "L", + "AC": "L", + "S": "C", + "UI": "R", + "AV": "N", + "I": "L" + }, + "TM": { + "RL": "O", + "E": "H", + "RC": "C" + } + } + }, + "data_version": "4.0", + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] } ] } diff --git a/2021/29xxx/CVE-2021-29837.json b/2021/29xxx/CVE-2021-29837.json index 07133b9c826..84fc76d929a 100644 --- a/2021/29xxx/CVE-2021-29837.json +++ b/2021/29xxx/CVE-2021-29837.json @@ -1,17 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29837", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-29837" + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator", + "version": { + "version_data": [ + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6495907 (Sterling B2B Integrator)", + "url": "https://www.ibm.com/support/pages/node/6495907", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6495907" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/204913", + "refsource": "XF", + "name": "ibm-sterling-cve202129837-csrf (204913)" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204913." + } + ] + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "UI": "R", + "I": "L", + "AV": "N", + "S": "U", + "AC": "L", + "C": "N", + "A": "N", + "SCORE": "4.300", + "PR": "N" + } + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Gain Access", + "lang": "eng" + } + ] } ] } diff --git a/2021/29xxx/CVE-2021-29855.json b/2021/29xxx/CVE-2021-29855.json index d469a260544..60556c01af2 100644 --- a/2021/29xxx/CVE-2021-29855.json +++ b/2021/29xxx/CVE-2021-29855.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-29855", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "H", + "RC": "C" + }, + "BM": { + "SCORE": "5.400", + "PR": "L", + "A": "N", + "AC": "L", + "C": "L", + "I": "L", + "AV": "N", + "UI": "R", + "S": "C" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + } + ] + }, + "product_name": "Sterling B2B Integrator" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6495965", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6495965", + "title": "IBM Security Bulletin 6495965 (Sterling B2B Integrator)" + }, + { + "name": "ibm-sterling-cve202129855-xss (205684)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/205684", + "title": "X-Force Vulnerability Report" + } + ] }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205684.", + "lang": "eng" } ] - } + }, + "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-29855", + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-10-05T00:00:00" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "data_format": "MITRE" } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29894.json b/2021/29xxx/CVE-2021-29894.json index ea6c249369c..f6ff833ccb8 100644 --- a/2021/29xxx/CVE-2021-29894.json +++ b/2021/29xxx/CVE-2021-29894.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", "data_version": "4.0", + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6493729 (Cloud Pak for Security)", + "name": "https://www.ibm.com/support/pages/node/6493729", + "url": "https://www.ibm.com/support/pages/node/6493729" + }, + { + "name": "ibm-cp4s-cve202129894-info-disc (207320)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207320", + "refsource": "XF", + "title": "X-Force Vulnerability Report" + } + ] + }, + "data_format": "MITRE", "CVE_data_meta": { + "DATE_PUBLIC": "2021-09-29T00:00:00", "ID": "CVE-2021-29894", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 207320." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "1.7.0.0" + }, + { + "version_value": "1.7.1.0" + }, + { + "version_value": "1.7.2.0" + }, + { + "version_value": "1.8.0.0" + } + ] + }, + "product_name": "Cloud Pak for Security" + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RL": "O", + "RC": "C" + }, + "BM": { + "SCORE": "5.900", + "C": "H", + "PR": "N", + "AC": "H", + "I": "N", + "A": "N", + "S": "U", + "UI": "N", + "AV": "N" + } + } } } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29903.json b/2021/29xxx/CVE-2021-29903.json index fb030541073..fe055dac97e 100644 --- a/2021/29xxx/CVE-2021-29903.json +++ b/2021/29xxx/CVE-2021-29903.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-29903", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Data Manipulation", + "lang": "eng" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506." } ] - } + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6495919", + "url": "https://www.ibm.com/support/pages/node/6495919", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6495919 (Sterling B2B Integrator)" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207506", + "refsource": "XF", + "name": "ibm-sterling-cve202129903-sql-injection (207506)" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + } + ] + }, + "product_name": "Sterling B2B Integrator" + } + ] + } + } + ] + } + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "A": "L", + "PR": "L", + "SCORE": "6.300", + "UI": "N", + "I": "L", + "AV": "N", + "S": "U", + "AC": "L", + "C": "L" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-29903" + }, + "data_type": "CVE" } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29908.json b/2021/29xxx/CVE-2021-29908.json index fe50ea12380..64e242d5e5b 100644 --- a/2021/29xxx/CVE-2021-29908.json +++ b/2021/29xxx/CVE-2021-29908.json @@ -1,18 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-29908", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "8.51.0.63" + }, + { + "version_value": "8.51.1.26" + }, + { + "version_value": "8.52.100.32" + } + ] + }, + "product_name": "Virtualization Engine TS7700 3957-VED" + }, + { + "product_name": "Virtualization Engine TS7700 3957-VEC", + "version": { + "version_data": [ + { + "version_value": "8.51.0.63" + }, + { + "version_value": "8.51.1.26" + }, + { + "version_value": "8.52.100.32" + } + ] + } + } + ] + } + } + ] + } }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2021-29908", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-05T00:00:00" + }, + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The IBM TS7700 Management Interface is vulnerable to unauthenticated access. By accessing a specially-crafted URL, an attacker may gain administrative access to the Management Interface without authentication. IBM X-Force ID: 207747.", + "lang": "eng" } ] - } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6495469 (Virtualization Engine TS7700 3957-VEC)", + "name": "https://www.ibm.com/support/pages/node/6495469", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6495469" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207747", + "refsource": "XF", + "name": "ibm-ts7700-cve202129908-sec-bypass (207747)" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "UI": "N", + "S": "U", + "PR": "N", + "SCORE": "9.100", + "AC": "L", + "I": "H", + "A": "N", + "AV": "N", + "C": "H" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Bypass Security", + "lang": "eng" + } + ] + } + ] + }, + "data_type": "CVE", + "data_format": "MITRE" } \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30542.json b/2021/30xxx/CVE-2021-30542.json index 12c301d0de2..20316cf9d4f 100644 --- a/2021/30xxx/CVE-2021-30542.json +++ b/2021/30xxx/CVE-2021-30542.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1184954", "refsource": "MISC", "name": "https://crbug.com/1184954" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-bc2770caed", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKQDE3PWDKASAPSUJYMOQGL73L3YQRFS/" } ] }, diff --git a/2021/30xxx/CVE-2021-30543.json b/2021/30xxx/CVE-2021-30543.json index 13b4db50b77..ce346a56d73 100644 --- a/2021/30xxx/CVE-2021-30543.json +++ b/2021/30xxx/CVE-2021-30543.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1203607", "refsource": "MISC", "name": "https://crbug.com/1203607" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-bc2770caed", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKQDE3PWDKASAPSUJYMOQGL73L3YQRFS/" } ] }, diff --git a/2021/30xxx/CVE-2021-30858.json b/2021/30xxx/CVE-2021-30858.json index c161f41565c..6c9132f2ac2 100644 --- a/2021/30xxx/CVE-2021-30858.json +++ b/2021/30xxx/CVE-2021-30858.json @@ -120,6 +120,11 @@ "refsource": "FULLDISC", "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5", "url": "http://seclists.org/fulldisclosure/2021/Sep/50" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-edf6957b7d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/" } ] }, diff --git a/2021/31xxx/CVE-2021-31923.json b/2021/31xxx/CVE-2021-31923.json index 988d7aef798..03696dfda1d 100644 --- a/2021/31xxx/CVE-2021-31923.json +++ b/2021/31xxx/CVE-2021-31923.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "responsible-disclosure@pingidentity.com", "ID": "CVE-2021-31923", "STATE": "PUBLIC" }, @@ -11,18 +11,18 @@ "product": { "product_data": [ { - "product_name": "n/a", + "product_name": "PingAccess", "version": { "version_data": [ { - "version_value": "n/a" + "version_value": "5.3" } ] } } ] }, - "vendor_name": "n/a" + "vendor_name": "Ping Identity" } ] } @@ -44,7 +44,7 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "HTTP Request Smuggling" } ] } diff --git a/2021/31xxx/CVE-2021-31986.json b/2021/31xxx/CVE-2021-31986.json index 99412c227a0..d870842f4f2 100644 --- a/2021/31xxx/CVE-2021-31986.json +++ b/2021/31xxx/CVE-2021-31986.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-31986", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@axis.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "AXIS OS", + "version": { + "version_data": [ + { + "version_value": "AXIS OS 6.40 or later" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer overflow, improper input validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.axis.com/files/tech_notes/CVE-2021-31986.pdf", + "url": "https://www.axis.com/files/tech_notes/CVE-2021-31986.pdf" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage." } ] } diff --git a/2021/31xxx/CVE-2021-31987.json b/2021/31xxx/CVE-2021-31987.json index fcc2580ba3b..ab88af71beb 100644 --- a/2021/31xxx/CVE-2021-31987.json +++ b/2021/31xxx/CVE-2021-31987.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-31987", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@axis.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "AXIS OS", + "version": { + "version_data": [ + { + "version_value": "AXIS OS 5.51 or later" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper input validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf", + "url": "https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients." } ] } diff --git a/2021/31xxx/CVE-2021-31988.json b/2021/31xxx/CVE-2021-31988.json index dc68cd5ae1c..ccfda59fd05 100644 --- a/2021/31xxx/CVE-2021-31988.json +++ b/2021/31xxx/CVE-2021-31988.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-31988", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@axis.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "AXIS OS", + "version": { + "version_data": [ + { + "version_value": "AXIS OS 5.51 or later" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper input validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.axis.com/files/tech_notes/CVE-2021-31988.pdf", + "url": "https://www.axis.com/files/tech_notes/CVE-2021-31988.pdf" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email." } ] } diff --git a/2021/32xxx/CVE-2021-32172.json b/2021/32xxx/CVE-2021-32172.json index 88e2d552bab..cfd63d456b0 100644 --- a/2021/32xxx/CVE-2021-32172.json +++ b/2021/32xxx/CVE-2021-32172.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-32172", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-32172", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maian Cart v3.8 contains a preauthorization remote code execution (RCE) exploit via a broken access control issue in the Elfinder plugin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.maianscriptworld.co.uk/", + "refsource": "MISC", + "name": "https://www.maianscriptworld.co.uk/" + }, + { + "url": "https://dreyand.github.io/maian-cart-rce/", + "refsource": "MISC", + "name": "https://dreyand.github.io/maian-cart-rce/" + }, + { + "url": "https://github.com/DreyAnd/maian-cart-rce", + "refsource": "MISC", + "name": "https://github.com/DreyAnd/maian-cart-rce" } ] } diff --git a/2021/32xxx/CVE-2021-32280.json b/2021/32xxx/CVE-2021-32280.json index 3c73910b7ff..197ab610c61 100644 --- a/2021/32xxx/CVE-2021-32280.json +++ b/2021/32xxx/CVE-2021-32280.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://sourceforge.net/p/mcj/fig2dev/ci/f17a3b8a7d54c1bc56ab92512531772a0b3ec991/", "url": "https://sourceforge.net/p/mcj/fig2dev/ci/f17a3b8a7d54c1bc56ab92512531772a0b3ec991/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] } diff --git a/2021/32xxx/CVE-2021-32626.json b/2021/32xxx/CVE-2021-32626.json index ffbf4ac76ed..9227756930a 100644 --- a/2021/32xxx/CVE-2021-32626.json +++ b/2021/32xxx/CVE-2021-32626.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32626", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Lua scripts can overflow the heap-based Lua stack in Redis" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": ">= 6.2.0, < 6.2.6" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": ">= 2.6.0, < 5.0.14" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code execution. This problem exists in all versions of Redis with Lua scripting support, starting from 2.6. The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. For users unable to update an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122: Heap-based Buffer Overflow" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" + }, + { + "name": "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" + } + ] + }, + "source": { + "advisory": "GHSA-p486-xggp-782c", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32627.json b/2021/32xxx/CVE-2021-32627.json index 0dad1fb431a..64b8ab7977c 100644 --- a/2021/32xxx/CVE-2021-32627.json +++ b/2021/32xxx/CVE-2021-32627.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32627", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integer overflow issue with Streams in Redis" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": ">= 5.0.0, < 5.0.14" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": ">= 6.2.0, < 6.2.6" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. In affected versions an integer overflow bug in Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default proto-max-bulk-len and client-query-buffer-limit configuration parameters to very large values and constructing specially crafted very large stream elements. The problem is fixed in Redis 6.2.6, 6.0.16 and 5.0.14. For users unable to upgrade an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-680: Integer Overflow to Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" + }, + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" + } + ] + }, + "source": { + "advisory": "GHSA-f434-69fm-g45v", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32628.json b/2021/32xxx/CVE-2021-32628.json index 0d0b48e839a..d92039b9b60 100644 --- a/2021/32xxx/CVE-2021-32628.json +++ b/2021/32xxx/CVE-2021-32628.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32628", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Vulnerability in handling large ziplists" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": ">= 6.2.0, < 6.2.6" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": "< 5.0.14" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists. The problem is fixed in Redis versions 6.2.6, 6.0.16, 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the above configuration parameters. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-680: Integer Overflow to Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" + }, + { + "name": "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" + } + ] + }, + "source": { + "advisory": "GHSA-vw22-qm3h-49pr", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32672.json b/2021/32xxx/CVE-2021-32672.json index 25772b3ae36..6689b9766a7 100644 --- a/2021/32xxx/CVE-2021-32672.json +++ b/2021/32xxx/CVE-2021-32672.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32672", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Vulnerability in Lua Debugger in Redis" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": ">= 3.2.0, < 5.0.14" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": ">= 6.0.0, < 6.2.6" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger\u2019s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" + }, + { + "name": "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" + } + ] + }, + "source": { + "advisory": "GHSA-9mj9-xx53-qmxm", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32675.json b/2021/32xxx/CVE-2021-32675.json index 7824f7a90d1..cc7d6ff978c 100644 --- a/2021/32xxx/CVE-2021-32675.json +++ b/2021/32xxx/CVE-2021-32675.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32675", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "DoS vulnerability in Redis" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": "< 5.0.14" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": ">= 6.2.0, < 6.2.6" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authentication requests, this vulnerability can also be exploited by unauthenticated users. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways: Using network access control tools like firewalls, iptables, security groups, etc. or Enabling TLS and requiring users to authenticate using client side certificates." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770: Allocation of Resources Without Limits or Throttling" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" + }, + { + "name": "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" + } + ] + }, + "source": { + "advisory": "GHSA-f6pw-v9gw-v64p", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32687.json b/2021/32xxx/CVE-2021-32687.json index 28dfdb62d5d..9c9315e98d1 100644 --- a/2021/32xxx/CVE-2021-32687.json +++ b/2021/32xxx/CVE-2021-32687.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32687", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integer overflow issue with intsets in Redis" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": "< 5.0.14" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": ">= 6.2.0, < 6.2.6" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration parameter to a very large value and constructing specially crafted commands to manipulate sets. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the set-max-intset-entries configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-680: Integer Overflow to Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" + }, + { + "name": "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" + } + ] + }, + "source": { + "advisory": "GHSA-m3mf-8x9w-r27q", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32762.json b/2021/32xxx/CVE-2021-32762.json index 9facc30ffd4..73b3c152bdd 100644 --- a/2021/32xxx/CVE-2021-32762.json +++ b/2021/32xxx/CVE-2021-32762.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32762", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integer overflow that can lead to heap overflow in redis-cli, redis-sentinel on some platforms" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": "< 5.0.14" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": ">= 6.2.0, < 6.2.6" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-680: Integer Overflow to Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr" + }, + { + "name": "https://github.com/redis/redis/commit/0215324a66af949be39b34be2d55143232c1cb71", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/0215324a66af949be39b34be2d55143232c1cb71" + } + ] + }, + "source": { + "advisory": "GHSA-833w-8v3m-8wwr", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32765.json b/2021/32xxx/CVE-2021-32765.json index 8b5628e7211..c117c4b3c70 100644 --- a/2021/32xxx/CVE-2021-32765.json +++ b/2021/32xxx/CVE-2021-32765.json @@ -1,18 +1,101 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32765", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integer Overflow to Buffer Overflow in Hiredis" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "hiredis", + "version": { + "version_data": [ + { + "version_value": "< 1.0.1" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-680: Integer Overflow to Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2", + "refsource": "CONFIRM", + "url": "https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2" + }, + { + "name": "https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e", + "refsource": "MISC", + "url": "https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e" + }, + { + "name": "https://wiki.sei.cmu.edu/confluence/display/c/MEM07-C.+Ensure+that+the+arguments+to+calloc%28%29%2C+when+multiplied%2C+do+not+wrap", + "refsource": "MISC", + "url": "https://wiki.sei.cmu.edu/confluence/display/c/MEM07-C.+Ensure+that+the+arguments+to+calloc%28%29%2C+when+multiplied%2C+do+not+wrap" + } + ] + }, + "source": { + "advisory": "GHSA-hfm9-39pp-55p2", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33035.json b/2021/33xxx/CVE-2021-33035.json index 429e50b0b9f..2259a629525 100644 --- a/2021/33xxx/CVE-2021-33035.json +++ b/2021/33xxx/CVE-2021-33035.json @@ -72,6 +72,21 @@ "refsource": "MISC", "url": "https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f", "name": "https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f" + }, + { + "refsource": "MLIST", + "name": "[announce] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", + "url": "https://lists.apache.org/thread.html/r929c0c6a53cad64a1007b878342756badbb05ddd9b8f31a6d0b424cb@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[openoffice-users] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", + "url": "https://lists.apache.org/thread.html/r1ab8532e11f41bc7ca057ac7e39cab25f2e1f9d5f4929788ae21c8b9@%3Cusers.openoffice.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/3" } ] }, diff --git a/2021/33xxx/CVE-2021-33044.json b/2021/33xxx/CVE-2021-33044.json index 89a59ab2a5a..fe40eb97703 100644 --- a/2021/33xxx/CVE-2021-33044.json +++ b/2021/33xxx/CVE-2021-33044.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://www.dahuasecurity.com/support/cybersecurity/details/957", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957" + }, + { + "refsource": "FULLDISC", + "name": "20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)", + "url": "http://seclists.org/fulldisclosure/2021/Oct/13" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html" } ] }, diff --git a/2021/33xxx/CVE-2021-33045.json b/2021/33xxx/CVE-2021-33045.json index b0c045b7f7b..99451ece969 100644 --- a/2021/33xxx/CVE-2021-33045.json +++ b/2021/33xxx/CVE-2021-33045.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://www.dahuasecurity.com/support/cybersecurity/details/957", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957" + }, + { + "refsource": "FULLDISC", + "name": "20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)", + "url": "http://seclists.org/fulldisclosure/2021/Oct/13" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html" } ] }, diff --git a/2021/33xxx/CVE-2021-33193.json b/2021/33xxx/CVE-2021-33193.json index b17660c5ab6..0daae672e51 100644 --- a/2021/33xxx/CVE-2021-33193.json +++ b/2021/33xxx/CVE-2021-33193.json @@ -92,6 +92,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210917-0004/", "url": "https://security.netapp.com/advisory/ntap-20210917-0004/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5d2d4b6ac5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/" } ] }, diff --git a/2021/33xxx/CVE-2021-33583.json b/2021/33xxx/CVE-2021-33583.json index 1f02899d462..4727378cebb 100644 --- a/2021/33xxx/CVE-2021-33583.json +++ b/2021/33xxx/CVE-2021-33583.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33583", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33583", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "REINER timeCard 6.05.07 installs a Microsoft SQL Server with an sa password that is hardcoded in the TCServer.jar file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.compass-security.com/fileadmin/Research/Advisories/2021-12_CSNC-2021-012_timeCard_Hardcoded_Credentials.txt", + "url": "https://www.compass-security.com/fileadmin/Research/Advisories/2021-12_CSNC-2021-012_timeCard_Hardcoded_Credentials.txt" } ] } diff --git a/2021/33xxx/CVE-2021-33602.json b/2021/33xxx/CVE-2021-33602.json index 90faa32552a..53ba7446f45 100644 --- a/2021/33xxx/CVE-2021-33602.json +++ b/2021/33xxx/CVE-2021-33602.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33602", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Denial-of-Service (DoS) Vulnerability " }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant & F-Secure Cloud Protection for Salesforce", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All Version " + } + ] + } + } + ] + }, + "vendor_name": "F-Secure" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability affecting the F-Secure Antivirus engine was discovered when the engine tries to unpack a zip archive (LZW decompression method), and this can crash the scanning engine. The vulnerability can be exploited remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service Vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", + "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "FIX No User action is required. The required fix has been published through the automatic update channel with Capricorn update 2021-09-29_03" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33603.json b/2021/33xxx/CVE-2021-33603.json index d3eb43bdb49..debb8f17abe 100644 --- a/2021/33xxx/CVE-2021-33603.json +++ b/2021/33xxx/CVE-2021-33603.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33603", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Denial-of-Service (DoS) Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant F-Secure Cloud Protection for Salesforce and Cloud Protection for Microsoft Office 365", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All Version " + } + ] + } + } + ] + }, + "vendor_name": "F-Secure" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVPACK module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service Vulnerability " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", + "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" + }, + { + "refsource": "MISC", + "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603", + "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-09-29_03\n" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33626.json b/2021/33xxx/CVE-2021-33626.json index 33f0dbd7cb1..d7c16137a31 100644 --- a/2021/33xxx/CVE-2021-33626.json +++ b/2021/33xxx/CVE-2021-33626.json @@ -1,18 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33626", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33626", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 through 5.5)." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.insyde.com/security-pledge/SA-2021001", + "url": "https://www.insyde.com/security-pledge/SA-2021001" + } + ] + }, + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33829.json b/2021/33xxx/CVE-2021-33829.json index 3f20f4d8a8c..2c30eae3e58 100644 --- a/2021/33xxx/CVE-2021-33829.json +++ b/2021/33xxx/CVE-2021-33829.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.drupal.org/sa-core-2021-003", + "url": "https://www.drupal.org/sa-core-2021-003" + }, { "refsource": "MISC", "name": "https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser", diff --git a/2021/33xxx/CVE-2021-33849.json b/2021/33xxx/CVE-2021-33849.json index aed4bdbfe19..98db183e912 100644 --- a/2021/33xxx/CVE-2021-33849.json +++ b/2021/33xxx/CVE-2021-33849.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-33849", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "disclose@cybersecurityworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Zoho", + "product": { + "product_data": [ + { + "product_name": "Zoho CRM Lead Magnet", + "version": { + "version_data": [ + { + "version_value": "1.7.2.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Neutralization of Input During Web Page Generation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html", + "url": "https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html" + }, + { + "refsource": "MISC", + "name": "https://cybersecurityworks.com/zerodays/cve-2021-33849-stored-cross-site-scripting-xss-in-wordpress-plugin-zoho-crm-lead-magnet-version-1-7-2-4.html", + "url": "https://cybersecurityworks.com/zerodays/cve-2021-33849-stored-cross-site-scripting-xss-in-wordpress-plugin-zoho-crm-lead-magnet-version-1-7-2-4.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user\u2019s browser while the browser is connected to a trusted website. The attack targets your application's users and not the application itself while using your application as the attack's vehicle. The XSS payload executes whenever the user changes the form values or deletes a created form in Zoho CRM Lead Magnet Version 1.7.2.4." } ] } diff --git a/2021/33xxx/CVE-2021-33903.json b/2021/33xxx/CVE-2021-33903.json index 09778c5838a..bfe8d4cb1ac 100644 --- a/2021/33xxx/CVE-2021-33903.json +++ b/2021/33xxx/CVE-2021-33903.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33903", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33903", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In LCOS 10.40 to 10.42.0473-RU3 with SNMPv3 enabled on LANCOM devices, changing the password of the root user via the CLI does not change the password of the root user for SNMPv3 access. (However, changing the password of the root user via LANconfig does change the password of the root user for SNMPv3 access.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.nmedv.de/wp-content/uploads/2021/09/NME-2021-001.txt", + "url": "https://www.nmedv.de/wp-content/uploads/2021/09/NME-2021-001.txt" } ] } diff --git a/2021/33xxx/CVE-2021-33907.json b/2021/33xxx/CVE-2021-33907.json index fb0a4ad857b..8298cbf2f92 100644 --- a/2021/33xxx/CVE-2021-33907.json +++ b/2021/33xxx/CVE-2021-33907.json @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/347.html", - "url": "https://cwe.mitre.org/data/definitions/347.html" + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34352.json b/2021/34xxx/CVE-2021-34352.json index 1ee8e815f2b..6cf5401587e 100644 --- a/2021/34xxx/CVE-2021-34352.json +++ b/2021/34xxx/CVE-2021-34352.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@qnap.com", + "DATE_PUBLIC": "2021-10-01T09:15:00.000Z", "ID": "CVE-2021-34352", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Command Injection Vulnerability in QVR" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "QVR", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5.1.5 build 20210902" + } + ] + } + } + ] + }, + "vendor_name": "QNAP Systems Inc." + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "360 \u7684\u5b89\u5168\u7814\u7a76\u5458 \u4faf\u7559\u6d0b\uff08houliuyang@360.cn\uff09\u548c\u53f6\u6839\u6df1\uff08yegenshen@360.cn\uff09" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210902 and later" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.qnap.com/en/security-advisory/qsa-21-38", + "name": "https://www.qnap.com/en/security-advisory/qsa-21-38" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "We have already fixed this vulnerability in the following versions of QVR:\nQVR 5.1.5 build 20210902 and later\n" + } + ], + "source": { + "advisory": "QSA-21-38", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34354.json b/2021/34xxx/CVE-2021-34354.json index 50a6939a575..11d1db96da2 100644 --- a/2021/34xxx/CVE-2021-34354.json +++ b/2021/34xxx/CVE-2021-34354.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@qnap.com", + "DATE_PUBLIC": "2021-10-01T09:09:00.000Z", "ID": "CVE-2021-34354", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored Cross-site Scripting Vulnerability in Photo Station" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Photo Station", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "6.0.18 ( 2021/09/01 )" + } + ] + } + } + ] + }, + "vendor_name": "QNAP Systems Inc." + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Tony Martin, a security researcher" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.18 ( 2021/09/01 ) and later" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.qnap.com/en/security-advisory/qsa-21-41", + "name": "https://www.qnap.com/en/security-advisory/qsa-21-41" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "We have already fixed this vulnerability in the following versions of Photo Station:\nPhoto Station 6.0.18 ( 2021/09/01 ) and later\n" + } + ], + "source": { + "advisory": "QSA-21-41", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34355.json b/2021/34xxx/CVE-2021-34355.json index f46331d49b6..67653c058c0 100644 --- a/2021/34xxx/CVE-2021-34355.json +++ b/2021/34xxx/CVE-2021-34355.json @@ -1,18 +1,108 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@qnap.com", + "DATE_PUBLIC": "2021-10-01T09:31:00.000Z", "ID": "CVE-2021-34355", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored XSS Vulnerability in Photo Station" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Photo Station", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5.4.10 ( 2021/08/19 )" + }, + { + "version_affected": "<", + "version_value": "5.7.13 ( 2021/08/19 )" + }, + { + "version_affected": "<", + "version_value": "6.0.18 ( 2021/09/01 )" + } + ] + } + } + ] + }, + "vendor_name": "QNAP Systems Inc." + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Tony Martin, a security researcher" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 5.4.10 ( 2021/08/19 ) and later Photo Station 5.7.13 ( 2021/08/19 ) and later Photo Station 6.0.18 ( 2021/09/01 ) and later" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.qnap.com/en/security-advisory/qsa-21-42", + "name": "https://www.qnap.com/en/security-advisory/qsa-21-42" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "We have already fixed this vulnerability in the following versions of Photo Station:\nPhoto Station 5.4.10 ( 2021/08/19 ) and later\nPhoto Station 5.7.13 ( 2021/08/19 ) and later\nPhoto Station 6.0.18 ( 2021/09/01 ) and later\n" + } + ], + "source": { + "advisory": "QSA-21-42", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34356.json b/2021/34xxx/CVE-2021-34356.json index af02c03b635..cd13ace0108 100644 --- a/2021/34xxx/CVE-2021-34356.json +++ b/2021/34xxx/CVE-2021-34356.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@qnap.com", + "DATE_PUBLIC": "2021-10-01T09:32:00.000Z", "ID": "CVE-2021-34356", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored XSS Vulnerability in Photo Station" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Photo Station", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "6.0.18 ( 2021/09/01 )" + } + ] + } + } + ] + }, + "vendor_name": "QNAP Systems Inc." + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Tony Martin, a security researcher" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.18 ( 2021/09/01 ) and later" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.qnap.com/en/security-advisory/qsa-21-41", + "name": "https://www.qnap.com/en/security-advisory/qsa-21-41" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "We have already fixed this vulnerability in the following versions of Photo Station:\nPhoto Station 6.0.18 ( 2021/09/01 ) and later\n" + } + ], + "source": { + "advisory": "QSA-21-41", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34408.json b/2021/34xxx/CVE-2021-34408.json index 21a37e3da2e..6609f31786f 100644 --- a/2021/34xxx/CVE-2021-34408.json +++ b/2021/34xxx/CVE-2021-34408.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/73.html", - "url": "https://cwe.mitre.org/data/definitions/73.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34409.json b/2021/34xxx/CVE-2021-34409.json index 4c50d248fc0..71c9c157805 100644 --- a/2021/34xxx/CVE-2021-34409.json +++ b/2021/34xxx/CVE-2021-34409.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/379.html", - "url": "https://cwe.mitre.org/data/definitions/379.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34410.json b/2021/34xxx/CVE-2021-34410.json index 5d0c4d8d804..57338522756 100644 --- a/2021/34xxx/CVE-2021-34410.json +++ b/2021/34xxx/CVE-2021-34410.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/379.html", - "url": "https://cwe.mitre.org/data/definitions/379.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34411.json b/2021/34xxx/CVE-2021-34411.json index a5be37407e5..5238f43cb88 100644 --- a/2021/34xxx/CVE-2021-34411.json +++ b/2021/34xxx/CVE-2021-34411.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/266.html", - "url": "https://cwe.mitre.org/data/definitions/266.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34412.json b/2021/34xxx/CVE-2021-34412.json index 1c968eeb91b..582c926288c 100644 --- a/2021/34xxx/CVE-2021-34412.json +++ b/2021/34xxx/CVE-2021-34412.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/266.html", - "url": "https://cwe.mitre.org/data/definitions/266.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34413.json b/2021/34xxx/CVE-2021-34413.json index 6254bd480fa..9dc550f49a0 100644 --- a/2021/34xxx/CVE-2021-34413.json +++ b/2021/34xxx/CVE-2021-34413.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/367.html", - "url": "https://cwe.mitre.org/data/definitions/367.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34414.json b/2021/34xxx/CVE-2021-34414.json index e8a1c777aa4..63fe4058e88 100644 --- a/2021/34xxx/CVE-2021-34414.json +++ b/2021/34xxx/CVE-2021-34414.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/78.html", - "url": "https://cwe.mitre.org/data/definitions/78.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34415.json b/2021/34xxx/CVE-2021-34415.json index 6cde10add33..1772d90e24d 100644 --- a/2021/34xxx/CVE-2021-34415.json +++ b/2021/34xxx/CVE-2021-34415.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/400.html", - "url": "https://cwe.mitre.org/data/definitions/400.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34416.json b/2021/34xxx/CVE-2021-34416.json index 2d91e4c7a5f..8b8ad6e3b6c 100644 --- a/2021/34xxx/CVE-2021-34416.json +++ b/2021/34xxx/CVE-2021-34416.json @@ -45,9 +45,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://cwe.mitre.org/data/definitions/78.html", - "url": "https://cwe.mitre.org/data/definitions/78.html" + "refsource": "CONFIRM", + "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", + "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, diff --git a/2021/34xxx/CVE-2021-34428.json b/2021/34xxx/CVE-2021-34428.json index 47e5e6a090d..6998bc7d671 100644 --- a/2021/34xxx/CVE-2021-34428.json +++ b/2021/34xxx/CVE-2021-34428.json @@ -119,6 +119,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E" } ] } diff --git a/2021/34xxx/CVE-2021-34698.json b/2021/34xxx/CVE-2021-34698.json index 64d41bdb306..7daa69f20e8 100644 --- a/2021/34xxx/CVE-2021-34698.json +++ b/2021/34xxx/CVE-2021-34698.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34698", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Web Security Appliance (WSA) ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.6", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-401" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk" + } + ] + }, + "source": { + "advisory": "cisco-sa-wsa-dos-fmHdKswk", + "defect": [ + [ + "CSCvv43704", + "CSCvw11261", + "CSCvz00720" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34702.json b/2021/34xxx/CVE-2021-34702.json index 7cc572bb719..29d428bdd87 100644 --- a/2021/34xxx/CVE-2021-34702.json +++ b/2021/34xxx/CVE-2021-34702.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34702", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Identity Services Engine Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to improper enforcement of administrator privilege levels for low-value sensitive data. An attacker with read-only administrator access to the web-based management interface could exploit this vulnerability by browsing to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-pNXtLhdp" + } + ] + }, + "source": { + "advisory": "cisco-sa-ise-info-disc-pNXtLhdp", + "defect": [ + [ + "CSCvy86528" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34706.json b/2021/34xxx/CVE-2021-34706.json index 7910264be7f..276f854f7eb 100644 --- a/2021/34xxx/CVE-2021-34706.json +++ b/2021/34xxx/CVE-2021-34706.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34706", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Identity Services Engine XML External Entity Injection Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Identity Services Engine Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information or conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the web application to perform arbitrary HTTP requests on behalf of the attacker." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "6.4", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Identity Services Engine XML External Entity Injection Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-V4VSjEsX" + } + ] + }, + "source": { + "advisory": "cisco-sa-ise-xxe-inj-V4VSjEsX", + "defect": [ + [ + "CSCvy75191" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34710.json b/2021/34xxx/CVE-2021-34710.json index f4aad16d751..f881e033737 100644 --- a/2021/34xxx/CVE-2021-34710.json +++ b/2021/34xxx/CVE-2021-34710.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34710", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Analog Telephone Adaptor (ATA) Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities in the Cisco ATA 190 Series Analog Telephone Adapter Software could allow an attacker to perform a command injection attack resulting in remote code execution or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-A4J57F3" + } + ] + }, + "source": { + "advisory": "cisco-sa-ata19x-multivuln-A4J57F3", + "defect": [ + [ + "CSCvw22570", + "CSCvw25739", + "CSCvw25740", + "CSCvx48193" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34711.json b/2021/34xxx/CVE-2021-34711.json index aac038bd111..381a1b1b213 100644 --- a/2021/34xxx/CVE-2021-34711.json +++ b/2021/34xxx/CVE-2021-34711.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34711", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco IP Phone Software Arbitrary File Read Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco IP Phones with Multiplatform Firmware ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "5.5", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-36" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco IP Phone Software Arbitrary File Read Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow" + } + ] + }, + "source": { + "advisory": "cisco-sa-ipphone-arbfileread-NPdtE2Ow", + "defect": [ + [ + "CSCvx85812", + "CSCvx85813", + "CSCvx85818", + "CSCvx85820", + "CSCvx85821", + "CSCvx85822", + "CSCvx85824" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34735.json b/2021/34xxx/CVE-2021-34735.json index 0bcea28644a..8db96fbad4e 100644 --- a/2021/34xxx/CVE-2021-34735.json +++ b/2021/34xxx/CVE-2021-34735.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34735", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Analog Telephone Adaptor (ATA) Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities in the Cisco ATA 190 Series Analog Telephone Adapter Software could allow an attacker to perform a command injection attack resulting in remote code execution or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-A4J57F3" + } + ] + }, + "source": { + "advisory": "cisco-sa-ata19x-multivuln-A4J57F3", + "defect": [ + [ + "CSCvw22570", + "CSCvw25739", + "CSCvw25740", + "CSCvx48193" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34742.json b/2021/34xxx/CVE-2021-34742.json index e9a944f10ec..bdccffd8991 100644 --- a/2021/34xxx/CVE-2021-34742.json +++ b/2021/34xxx/CVE-2021-34742.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34742", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco\u00a0Vision Dynamic Signage Director Reflected Cross-Site Scripting Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Vision Dynamic Signage Director ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "6.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco\u00a0Vision Dynamic Signage Director Reflected Cross-Site Scripting Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-xss-fvdj6HK" + } + ] + }, + "source": { + "advisory": "cisco-sa-cvdsd-xss-fvdj6HK", + "defect": [ + [ + "CSCvy84939" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34744.json b/2021/34xxx/CVE-2021-34744.json index d7c28b67577..436aa0d84c2 100644 --- a/2021/34xxx/CVE-2021-34744.json +++ b/2021/34xxx/CVE-2021-34744.json @@ -1,18 +1,87 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34744", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 220 Series Smart Plus Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account. For more information about these vulnerabilities, see the Details section of this advisory." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "5.5", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-540" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb-hardcoded-cred-MJCEXvX", + "defect": [ + [ + "CSCvy90709", + "CSCvy90713" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34748.json b/2021/34xxx/CVE-2021-34748.json index 637593ab7a7..dccc9b0a017 100644 --- a/2021/34xxx/CVE-2021-34748.json +++ b/2021/34xxx/CVE-2021-34748.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34748", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Intersight Virtual Appliance Command Injection Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Intersight Virtual Appliance ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the web-based management interface of Cisco Intersight Virtual Appliance could allow an authenticated, remote attacker to perform a command injection attack on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using the web-based management interface to execute a command using crafted input. A successful exploit could allow the attacker to execute arbitrary commands using root-level privileges on an affected device." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Intersight Virtual Appliance Command Injection Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-command-inject-CGyC8y2R" + } + ] + }, + "source": { + "advisory": "cisco-sa-ucsi2-command-inject-CGyC8y2R", + "defect": [ + [ + "CSCvz08353" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34757.json b/2021/34xxx/CVE-2021-34757.json index b7ea93a3432..351653ba12b 100644 --- a/2021/34xxx/CVE-2021-34757.json +++ b/2021/34xxx/CVE-2021-34757.json @@ -1,18 +1,87 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34757", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 220 Series Smart Plus Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account. For more information about these vulnerabilities, see the Details section of this advisory." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "5.5", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-540" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb-hardcoded-cred-MJCEXvX", + "defect": [ + [ + "CSCvy90709", + "CSCvy90713" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34758.json b/2021/34xxx/CVE-2021-34758.json index 6327696c2e4..5748903fb3d 100644 --- a/2021/34xxx/CVE-2021-34758.json +++ b/2021/34xxx/CVE-2021-34758.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34758", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco RoomOS Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the memory management of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, local attacker to corrupt a shared memory segment, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient access controls to a shared memory resource. An attacker could exploit this vulnerability by corrupting a shared memory segment on an affected device. A successful exploit could allow the attacker to cause the device to reload. The device will recover from the corruption upon reboot." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "4.4", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-732" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tpce-rmos-mem-dos-rck56tT" + } + ] + }, + "source": { + "advisory": "cisco-sa-tpce-rmos-mem-dos-rck56tT", + "defect": [ + [ + "CSCvy60378" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34766.json b/2021/34xxx/CVE-2021-34766.json index a66cc88b50e..2992a8b80d7 100644 --- a/2021/34xxx/CVE-2021-34766.json +++ b/2021/34xxx/CVE-2021-34766.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34766", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Smart Software Manager Privilege Escalation Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Smart Software Manager On-Prem ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the web UI of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and create, read, update, or delete records and settings in multiple functions. This vulnerability is due to insufficient authorization of the System User and System Operator role capabilities. An attacker could exploit this vulnerability by directly accessing a web resource. A successful exploit could allow the attacker to create, read, update, or delete records and settings in multiple functions without the necessary permissions on the web UI." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "5.4", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Smart Software Manager Privilege Escalation Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-priv-esc-5g35cdDJ" + } + ] + }, + "source": { + "advisory": "cisco-sa-ssm-priv-esc-5g35cdDJ", + "defect": [ + [ + "CSCvz05241" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34772.json b/2021/34xxx/CVE-2021-34772.json index 08b07dca0a1..eeb3a20d124 100644 --- a/2021/34xxx/CVE-2021-34772.json +++ b/2021/34xxx/CVE-2021-34772.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34772", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Orbital Open Redirect Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Orbital ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage. This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "4.7", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-601" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Orbital Open Redirect Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU" + } + ] + }, + "source": { + "advisory": "cisco-sa-amp-redirect-rQ2Bu7dU", + "defect": [ + [ + "CSCvz26821" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34775.json b/2021/34xxx/CVE-2021-34775.json index 79fb392fc2f..fa2daaaf730 100644 --- a/2021/34xxx/CVE-2021-34775.json +++ b/2021/34xxx/CVE-2021-34775.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34775", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 200 Series Smart Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb220-lldp-multivuls-mVRUtQ8T", + "defect": [ + [ + "CSCvz29108", + "CSCvz29116", + "CSCvz29120", + "CSCvz29121", + "CSCvz29126", + "CSCvz29134" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34776.json b/2021/34xxx/CVE-2021-34776.json index 60b5456a1fd..5acf7302766 100644 --- a/2021/34xxx/CVE-2021-34776.json +++ b/2021/34xxx/CVE-2021-34776.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34776", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 200 Series Smart Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb220-lldp-multivuls-mVRUtQ8T", + "defect": [ + [ + "CSCvz29108", + "CSCvz29116", + "CSCvz29120", + "CSCvz29121", + "CSCvz29126", + "CSCvz29134" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34777.json b/2021/34xxx/CVE-2021-34777.json index 1308a821fa9..0517c5d8958 100644 --- a/2021/34xxx/CVE-2021-34777.json +++ b/2021/34xxx/CVE-2021-34777.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34777", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 200 Series Smart Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb220-lldp-multivuls-mVRUtQ8T", + "defect": [ + [ + "CSCvz29108", + "CSCvz29116", + "CSCvz29120", + "CSCvz29121", + "CSCvz29126", + "CSCvz29134" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34778.json b/2021/34xxx/CVE-2021-34778.json index dabdcd03b90..7e0a39bed87 100644 --- a/2021/34xxx/CVE-2021-34778.json +++ b/2021/34xxx/CVE-2021-34778.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34778", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 200 Series Smart Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb220-lldp-multivuls-mVRUtQ8T", + "defect": [ + [ + "CSCvz29108", + "CSCvz29116", + "CSCvz29120", + "CSCvz29121", + "CSCvz29126", + "CSCvz29134" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34779.json b/2021/34xxx/CVE-2021-34779.json index 64091e21219..9221bb774c8 100644 --- a/2021/34xxx/CVE-2021-34779.json +++ b/2021/34xxx/CVE-2021-34779.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34779", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 200 Series Smart Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb220-lldp-multivuls-mVRUtQ8T", + "defect": [ + [ + "CSCvz29108", + "CSCvz29116", + "CSCvz29120", + "CSCvz29121", + "CSCvz29126", + "CSCvz29134" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34780.json b/2021/34xxx/CVE-2021-34780.json index 71b06f99e73..bb3824ada97 100644 --- a/2021/34xxx/CVE-2021-34780.json +++ b/2021/34xxx/CVE-2021-34780.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34780", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Small Business 200 Series Smart Switches ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "8.8", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T" + } + ] + }, + "source": { + "advisory": "cisco-sa-sb220-lldp-multivuls-mVRUtQ8T", + "defect": [ + [ + "CSCvz29108", + "CSCvz29116", + "CSCvz29120", + "CSCvz29121", + "CSCvz29126", + "CSCvz29134" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34782.json b/2021/34xxx/CVE-2021-34782.json index b5ea3ce99c0..2dc40d956d6 100644 --- a/2021/34xxx/CVE-2021-34782.json +++ b/2021/34xxx/CVE-2021-34782.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34782", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco DNA Center Information Disclosure Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Digital Network Architecture Center (DNA Center) ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the API endpoints for Cisco DNA Center could allow an authenticated, remote attacker to gain access to sensitive information that should be restricted. The attacker must have valid device credentials. This vulnerability is due to improper access controls on API endpoints. An attacker could exploit the vulnerability by sending a specific API request to an affected application. A successful exploit could allow the attacker to obtain sensitive information about other users who are configured with higher privileges on the application." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-202" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco DNA Center Information Disclosure Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-KyC6YncS" + } + ] + }, + "source": { + "advisory": "cisco-sa-dnac-infodisc-KyC6YncS", + "defect": [ + [ + "CSCvy18258" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34788.json b/2021/34xxx/CVE-2021-34788.json index 26ac102f3ee..7681b51748c 100644 --- a/2021/34xxx/CVE-2021-34788.json +++ b/2021/34xxx/CVE-2021-34788.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-10-06T16:00:00", "ID": "CVE-2021-34788", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco AnyConnect Secure Mobility Client for Linux and Mac OS with VPN Posture (HostScan) Module Shared Library Hijacking Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco AnyConnect Secure Mobility Client ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the shared library loading mechanism of Cisco AnyConnect Secure Mobility Client for Linux and Mac OS could allow an authenticated, local attacker to perform a shared library hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for shared library files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with root privileges. To exploit this vulnerability, the attacker must have a valid account on the system." } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "7.0", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-367" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20211006 Cisco AnyConnect Secure Mobility Client for Linux and Mac OS with VPN Posture (HostScan) Module Shared Library Hijacking Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-lib-hija-cAFB7x4q" + } + ] + }, + "source": { + "advisory": "cisco-sa-anyconnect-lib-hija-cAFB7x4q", + "defect": [ + [ + "CSCvz38781" + ] + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34798.json b/2021/34xxx/CVE-2021-34798.json index bc608e5c394..54e91aa39cb 100644 --- a/2021/34xxx/CVE-2021-34798.json +++ b/2021/34xxx/CVE-2021-34798.json @@ -103,6 +103,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-e3f6dd670d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0004/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0004/" } ] }, diff --git a/2021/35xxx/CVE-2021-35067.json b/2021/35xxx/CVE-2021-35067.json index 1af57df3d1d..36339d3a469 100644 --- a/2021/35xxx/CVE-2021-35067.json +++ b/2021/35xxx/CVE-2021-35067.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35067", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35067", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Meross MSG100 devices before 3.2.3 allow an attacker to replay the same data or similar data (e.g., an attacker who sniffs a Close message can transmit an acceptable Open message)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://infosec.rm-it.de/?p=878&preview=1&_ppp=219bc85c2f", + "refsource": "MISC", + "name": "https://infosec.rm-it.de/?p=878&preview=1&_ppp=219bc85c2f" + }, + { + "refsource": "MISC", + "name": "https://infosec.rm-it.de/2021/06/18/meross-smart-wi-fi-garage-door-opener-analysis/", + "url": "https://infosec.rm-it.de/2021/06/18/meross-smart-wi-fi-garage-door-opener-analysis/" } ] } diff --git a/2021/35xxx/CVE-2021-35197.json b/2021/35xxx/CVE-2021-35197.json index 2fab5e428b6..224c28abe13 100644 --- a/2021/35xxx/CVE-2021-35197.json +++ b/2021/35xxx/CVE-2021-35197.json @@ -66,6 +66,11 @@ "refsource": "GENTOO", "name": "GLSA-202107-40", "url": "https://security.gentoo.org/glsa/202107-40" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4979", + "url": "https://www.debian.org/security/2021/dsa-4979" } ] } diff --git a/2021/35xxx/CVE-2021-35198.json b/2021/35xxx/CVE-2021-35198.json index ab080998328..4d60a4143fc 100644 --- a/2021/35xxx/CVE-2021-35198.json +++ b/2021/35xxx/CVE-2021-35198.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35198", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35198", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETSCOUT nGeniusONE 6.3.0 build 1004 and earlier allows Stored Cross-Site Scripting (XSS) in the Packet Analysis module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35199.json b/2021/35xxx/CVE-2021-35199.json index 812fe5acdcb..09d0dbc0e8a 100644 --- a/2021/35xxx/CVE-2021-35199.json +++ b/2021/35xxx/CVE-2021-35199.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35199", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35199", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETSCOUT nGeniusONE 6.3.0 build 1196 and earlier allows Stored Cross-Site Scripting (XSS) in UploadFile." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35200.json b/2021/35xxx/CVE-2021-35200.json index 89f7a2222ac..729ddbb6dfc 100644 --- a/2021/35xxx/CVE-2021-35200.json +++ b/2021/35xxx/CVE-2021-35200.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35200", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35200", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETSCOUT nGeniusONE 6.3.0 build 1196 allows high-privileged users to achieve Stored Cross-Site Scripting (XSS) in FDSQueryService." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35201.json b/2021/35xxx/CVE-2021-35201.json index 52747ca147b..ef4d13108a4 100644 --- a/2021/35xxx/CVE-2021-35201.json +++ b/2021/35xxx/CVE-2021-35201.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35201", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35201", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NEI in NETSCOUT nGeniusONE 6.3.0 build 1196 allows XML External Entity (XXE) attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35202.json b/2021/35xxx/CVE-2021-35202.json index 2f0f8eb212c..12b9ac3cc8d 100644 --- a/2021/35xxx/CVE-2021-35202.json +++ b/2021/35xxx/CVE-2021-35202.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35202", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35202", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Authorization Bypass (to access an endpoint) in FDSQueryService." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35203.json b/2021/35xxx/CVE-2021-35203.json index 81918a82d2e..dd82e8aa999 100644 --- a/2021/35xxx/CVE-2021-35203.json +++ b/2021/35xxx/CVE-2021-35203.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35203", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35203", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Arbitrary File Read operations via the FDSQueryService endpoint." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35204.json b/2021/35xxx/CVE-2021-35204.json index 69afefe2f23..7489c73664a 100644 --- a/2021/35xxx/CVE-2021-35204.json +++ b/2021/35xxx/CVE-2021-35204.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35204", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35204", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Reflected Cross-Site Scripting (XSS) in the support endpoint." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35205.json b/2021/35xxx/CVE-2021-35205.json index 6ddc2d2385a..859d31eb9d4 100644 --- a/2021/35xxx/CVE-2021-35205.json +++ b/2021/35xxx/CVE-2021-35205.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35205", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35205", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETSCOUT Systems nGeniusONE version 6.3.0 build 1196 allows URL redirection in redirector." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netscout.com/securityadvisories", + "refsource": "MISC", + "name": "https://www.netscout.com/securityadvisories" } ] } diff --git a/2021/35xxx/CVE-2021-35296.json b/2021/35xxx/CVE-2021-35296.json index f2261a192a2..f58e06b141b 100644 --- a/2021/35xxx/CVE-2021-35296.json +++ b/2021/35xxx/CVE-2021-35296.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35296", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35296", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in the administrator authentication panel of PTCL HG150-Ub v3.0 allows attackers to bypass authentication via modification of the cookie value and Response Path." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/afaq1337/CVE-2021-35296", + "url": "https://github.com/afaq1337/CVE-2021-35296" } ] } diff --git a/2021/35xxx/CVE-2021-35297.json b/2021/35xxx/CVE-2021-35297.json index 43f6b45fe55..26b574ad198 100644 --- a/2021/35xxx/CVE-2021-35297.json +++ b/2021/35xxx/CVE-2021-35297.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35297", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35297", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Scalabium dBase Viewer version 2.6 (Build 5.751) is vulnerable to remote code execution via a crafted DBF file that triggers a buffer overflow. An attacker can use the Structured Exception Handler (SEH) records and redirect execution to attacker-controlled code." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://govtech-csg.github.io/security-advisories/2021/09/18/CVE-2021-35297.html", + "url": "https://govtech-csg.github.io/security-advisories/2021/09/18/CVE-2021-35297.html" } ] } diff --git a/2021/35xxx/CVE-2021-35491.json b/2021/35xxx/CVE-2021-35491.json index d7da5cd2fe1..8d1713ad3a0 100644 --- a/2021/35xxx/CVE-2021-35491.json +++ b/2021/35xxx/CVE-2021-35491.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35491", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35491", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Request Forgery (CSRF) vulnerability in Wowza Streaming Engine through 4.8.11+5 allows a remote attacker to delete a user account via the /enginemanager/server/user/delete.htm userName parameter. The application does not implement a CSRF token for the GET request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.gruppotim.it/redteam", + "url": "https://www.gruppotim.it/redteam" + }, + { + "refsource": "MISC", + "name": "https://www.wowza.com/docs/wowza-streaming-engine-4-8-14-release-notes", + "url": "https://www.wowza.com/docs/wowza-streaming-engine-4-8-14-release-notes" + }, + { + "refsource": "MISC", + "name": "https://n4nj0.github.io/advisories/wowza-streaming-engine-i/", + "url": "https://n4nj0.github.io/advisories/wowza-streaming-engine-i/" } ] } diff --git a/2021/35xxx/CVE-2021-35492.json b/2021/35xxx/CVE-2021-35492.json index 2be1421c7d6..81d313c6ef9 100644 --- a/2021/35xxx/CVE-2021-35492.json +++ b/2021/35xxx/CVE-2021-35492.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35492", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35492", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wowza Streaming Engine through 4.8.11+5 could allow an authenticated, remote attacker to exhaust filesystem resources via the /enginemanager/server/vhost/historical.jsdata vhost parameter. This is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability through the Virtual Host Monitoring section by requesting random virtual-host historical data and exhausting available filesystem resources. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management. (Manual intervention is required to free filesystem resources and return the application to an operational state.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.gruppotim.it/redteam", + "url": "https://www.gruppotim.it/redteam" + }, + { + "refsource": "MISC", + "name": "https://www.wowza.com/docs/wowza-streaming-engine-4-8-14-release-notes", + "url": "https://www.wowza.com/docs/wowza-streaming-engine-4-8-14-release-notes" } ] } diff --git a/2021/35xxx/CVE-2021-35497.json b/2021/35xxx/CVE-2021-35497.json index 16d504f652c..09d382a9f62 100644 --- a/2021/35xxx/CVE-2021-35497.json +++ b/2021/35xxx/CVE-2021-35497.json @@ -1,18 +1,411 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2021-10-05T17:00:00Z", "ID": "CVE-2021-35497", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "TIBCO FTL unvalidated SAN in client certificates" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "TIBCO ActiveSpaces - Community Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.3.0" + }, + { + "version_affected": "=", + "version_value": "4.4.0" + }, + { + "version_affected": "=", + "version_value": "4.5.0" + }, + { + "version_affected": "=", + "version_value": "4.6.0" + }, + { + "version_affected": "=", + "version_value": "4.6.1" + }, + { + "version_affected": "=", + "version_value": "4.6.2" + } + ] + } + }, + { + "product_name": "TIBCO ActiveSpaces - Developer Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.3.0" + }, + { + "version_affected": "=", + "version_value": "4.4.0" + }, + { + "version_affected": "=", + "version_value": "4.5.0" + }, + { + "version_affected": "=", + "version_value": "4.6.0" + }, + { + "version_affected": "=", + "version_value": "4.6.1" + }, + { + "version_affected": "=", + "version_value": "4.6.2" + } + ] + } + }, + { + "product_name": "TIBCO ActiveSpaces - Enterprise Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.3.0" + }, + { + "version_affected": "=", + "version_value": "4.4.0" + }, + { + "version_affected": "=", + "version_value": "4.5.0" + }, + { + "version_affected": "=", + "version_value": "4.6.0" + }, + { + "version_affected": "=", + "version_value": "4.6.1" + }, + { + "version_affected": "=", + "version_value": "4.6.2" + } + ] + } + }, + { + "product_name": "TIBCO FTL - Community Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.2.0" + }, + { + "version_affected": "=", + "version_value": "6.3.0" + }, + { + "version_affected": "=", + "version_value": "6.3.1" + }, + { + "version_affected": "=", + "version_value": "6.4.0" + }, + { + "version_affected": "=", + "version_value": "6.5.0" + }, + { + "version_affected": "=", + "version_value": "6.6.0" + }, + { + "version_affected": "=", + "version_value": "6.6.1" + }, + { + "version_affected": "=", + "version_value": "6.7.0" + } + ] + } + }, + { + "product_name": "TIBCO FTL - Developer Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.2.0" + }, + { + "version_affected": "=", + "version_value": "6.3.0" + }, + { + "version_affected": "=", + "version_value": "6.3.1" + }, + { + "version_affected": "=", + "version_value": "6.4.0" + }, + { + "version_affected": "=", + "version_value": "6.5.0" + }, + { + "version_affected": "=", + "version_value": "6.6.0" + }, + { + "version_affected": "=", + "version_value": "6.6.1" + }, + { + "version_affected": "=", + "version_value": "6.7.0" + } + ] + } + }, + { + "product_name": "TIBCO FTL - Enterprise Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.2.0" + }, + { + "version_affected": "=", + "version_value": "6.3.0" + }, + { + "version_affected": "=", + "version_value": "6.3.1" + }, + { + "version_affected": "=", + "version_value": "6.4.0" + }, + { + "version_affected": "=", + "version_value": "6.5.0" + }, + { + "version_affected": "=", + "version_value": "6.6.0" + }, + { + "version_affected": "=", + "version_value": "6.6.1" + }, + { + "version_affected": "=", + "version_value": "6.7.0" + } + ] + } + }, + { + "product_name": "TIBCO eFTL - Community Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.2.0" + }, + { + "version_affected": "=", + "version_value": "6.3.0" + }, + { + "version_affected": "=", + "version_value": "6.3.1" + }, + { + "version_affected": "=", + "version_value": "6.4.0" + }, + { + "version_affected": "=", + "version_value": "6.5.0" + }, + { + "version_affected": "=", + "version_value": "6.6.0" + }, + { + "version_affected": "=", + "version_value": "6.6.1" + }, + { + "version_affected": "=", + "version_value": "6.7.0" + } + ] + } + }, + { + "product_name": "TIBCO eFTL - Developer Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.2.0" + }, + { + "version_affected": "=", + "version_value": "6.3.0" + }, + { + "version_affected": "=", + "version_value": "6.3.1" + }, + { + "version_affected": "=", + "version_value": "6.4.0" + }, + { + "version_affected": "=", + "version_value": "6.5.0" + }, + { + "version_affected": "=", + "version_value": "6.6.0" + }, + { + "version_affected": "=", + "version_value": "6.6.1" + }, + { + "version_affected": "=", + "version_value": "6.7.0" + } + ] + } + }, + { + "product_name": "TIBCO eFTL - Enterprise Edition", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.2.0" + }, + { + "version_affected": "=", + "version_value": "6.3.0" + }, + { + "version_affected": "=", + "version_value": "6.3.1" + }, + { + "version_affected": "=", + "version_value": "6.4.0" + }, + { + "version_affected": "=", + "version_value": "6.5.0" + }, + { + "version_affected": "=", + "version_value": "6.6.0" + }, + { + "version_affected": "=", + "version_value": "6.6.1" + }, + { + "version_affected": "=", + "version_value": "6.7.0" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The FTL Server (tibftlserver) and Docker images containing tibftlserver components of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, TIBCO ActiveSpaces - Enterprise Edition, TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, TIBCO FTL - Enterprise Edition, TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contain a vulnerability that theoretically allows a non-administrative, authenticated FTL user to trick the affected components into creating illegitimate certificates. These maliciously generated certificates can be used to enable man-in-the-middle attacks or to escalate privileges so that the malicious user has administrative privileges. Affected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2, TIBCO ActiveSpaces - Developer Edition: versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2, TIBCO ActiveSpaces - Enterprise Edition: versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2, TIBCO FTL - Community Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO FTL - Developer Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO FTL - Enterprise Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO eFTL - Community Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, TIBCO eFTL - Developer Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0, and TIBCO eFTL - Enterprise Edition: versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The impact of this vulnerability includes the theoretical possibility that a malicious non-administrative user can gain full administrative access to the affected system." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.tibco.com/services/support/advisories", + "refsource": "CONFIRM", + "url": "https://www.tibco.com/services/support/advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tibco.com/support/advisories/2021/10/tibco-security-advisory-october-5-2021-tibco-ftl-2021-35497", + "url": "https://www.tibco.com/support/advisories/2021/10/tibco-security-advisory-october-5-2021-tibco-ftl-2021-35497" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO ActiveSpaces - Community Edition versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2 update to version 4.7.0 or later\nTIBCO ActiveSpaces - Developer Edition versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2 update to version 4.7.0 or later\nTIBCO ActiveSpaces - Enterprise Edition versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, and 4.6.2 update to version 4.7.0 or later\nTIBCO FTL - Community Edition versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0 update to version 6.7.1 or later\nTIBCO FTL - Developer Edition versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0 update to version 6.7.1 or later\nTIBCO FTL - Enterprise Edition versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0 update to version 6.7.1 or later\nTIBCO eFTL - Community Edition versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0 update to version 6.7.1 or later\nTIBCO eFTL - Developer Edition versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0 update to version 6.7.1 or later\nTIBCO eFTL - Enterprise Edition versions 6.2.0, 6.3.0, 6.3.1, 6.4.0, 6.5.0, 6.6.0, 6.6.1, and 6.7.0 update to version 6.7.1 or later" + } + ], + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/35xxx/CVE-2021-35503.json b/2021/35xxx/CVE-2021-35503.json index 432a08ff200..812aeeb3d61 100644 --- a/2021/35xxx/CVE-2021-35503.json +++ b/2021/35xxx/CVE-2021-35503.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35503", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35503", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Afian FileRun 2021.03.26 allows stored XSS via an HTTP X-Forwarded-For header that is mishandled when rendering Activity Logs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://blog.filerun.com", + "refsource": "MISC", + "name": "http://blog.filerun.com" + }, + { + "refsource": "MISC", + "name": "https://syntegris-sec.github.io/filerun-advisory", + "url": "https://syntegris-sec.github.io/filerun-advisory" } ] } diff --git a/2021/35xxx/CVE-2021-35504.json b/2021/35xxx/CVE-2021-35504.json index 8d0714ad805..19b0870bf3f 100644 --- a/2021/35xxx/CVE-2021-35504.json +++ b/2021/35xxx/CVE-2021-35504.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35504", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35504", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Afian FileRun 2021.03.26 allows Remote Code Execution (by administrators) via the Check Path value for the ffmpeg binary." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://blog.filerun.com", + "refsource": "MISC", + "name": "http://blog.filerun.com" + }, + { + "refsource": "MISC", + "name": "https://syntegris-sec.github.io/filerun-advisory", + "url": "https://syntegris-sec.github.io/filerun-advisory" } ] } diff --git a/2021/35xxx/CVE-2021-35505.json b/2021/35xxx/CVE-2021-35505.json index 485de477aab..d3a6eb06655 100644 --- a/2021/35xxx/CVE-2021-35505.json +++ b/2021/35xxx/CVE-2021-35505.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35505", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35505", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Afian FileRun 2021.03.26 allows Remote Code Execution (by administrators) via the Check Path value for the magick binary." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://blog.filerun.com", + "refsource": "MISC", + "name": "http://blog.filerun.com" + }, + { + "refsource": "MISC", + "name": "https://syntegris-sec.github.io/filerun-advisory", + "url": "https://syntegris-sec.github.io/filerun-advisory" } ] } diff --git a/2021/35xxx/CVE-2021-35506.json b/2021/35xxx/CVE-2021-35506.json index d241ee4d83f..5d908a5e033 100644 --- a/2021/35xxx/CVE-2021-35506.json +++ b/2021/35xxx/CVE-2021-35506.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35506", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35506", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Afian FileRun 2021.03.26 allows XSS when an administrator encounters a crafted document during use of the HTML Editor for a preview or edit action." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://blog.filerun.com", + "refsource": "MISC", + "name": "http://blog.filerun.com" + }, + { + "refsource": "MISC", + "name": "https://syntegris-sec.github.io/filerun-advisory", + "url": "https://syntegris-sec.github.io/filerun-advisory" } ] } diff --git a/2021/35xxx/CVE-2021-35977.json b/2021/35xxx/CVE-2021-35977.json index eb07f7ae883..3b218b1779d 100644 --- a/2021/35xxx/CVE-2021-35977.json +++ b/2021/35xxx/CVE-2021-35977.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35977", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35977", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt", + "url": "https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt" } ] } diff --git a/2021/35xxx/CVE-2021-35979.json b/2021/35xxx/CVE-2021-35979.json index c7a5bad1c81..af7dd92df1a 100644 --- a/2021/35xxx/CVE-2021-35979.json +++ b/2021/35xxx/CVE-2021-35979.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-35979", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-35979", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt", + "url": "https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt" } ] } diff --git a/2021/36xxx/CVE-2021-36051.json b/2021/36xxx/CVE-2021-36051.json index 8590f3bdac1..740032768e0 100644 --- a/2021/36xxx/CVE-2021-36051.json +++ b/2021/36xxx/CVE-2021-36051.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-08-16T23:00:00.000Z", "ID": "CVE-2021-36051", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "XMP Toolkit SDK Buffer Overflow Could Lead To Arbitrary Code Execution" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "XMP Toolkit", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "2020.1" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a specially-crafted .cpp file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow (CWE-122)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html", + "name": "https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36150.json b/2021/36xxx/CVE-2021-36150.json index dab8ef8086f..e46be4f5936 100644 --- a/2021/36xxx/CVE-2021-36150.json +++ b/2021/36xxx/CVE-2021-36150.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-36150", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-36150", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SilverStripe Framework through 4.8.1 allows XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/silverstripe/silverstripe-framework/releases", + "refsource": "MISC", + "name": "https://github.com/silverstripe/silverstripe-framework/releases" + }, + { + "refsource": "MISC", + "name": "https://www.silverstripe.org/download/security-releases/CVE-2021-36150", + "url": "https://www.silverstripe.org/download/security-releases/CVE-2021-36150" } ] } diff --git a/2021/36xxx/CVE-2021-36160.json b/2021/36xxx/CVE-2021-36160.json index 4b1956ea7e8..b9876d34e7d 100644 --- a/2021/36xxx/CVE-2021-36160.json +++ b/2021/36xxx/CVE-2021-36160.json @@ -123,6 +123,26 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2768-1] uwsgi security update", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html" + }, + { + "refsource": "MLIST", + "name": "[httpd-bugs] 20211005 [Bug 65616] New: CVE-2021-36160 regression", + "url": "https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781@%3Cbugs.httpd.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[httpd-bugs] 20211005 [Bug 65616] CVE-2021-36160 regression", + "url": "https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c@%3Cbugs.httpd.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[httpd-bugs] 20211006 [Bug 65616] CVE-2021-36160 regression", + "url": "https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0004/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0004/" } ] }, diff --git a/2021/36xxx/CVE-2021-36170.json b/2021/36xxx/CVE-2021-36170.json index 4e980e5d4fe..cfffae9bfa4 100644 --- a/2021/36xxx/CVE-2021-36170.json +++ b/2021/36xxx/CVE-2021-36170.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-36170", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiManager, FortiAnalyzer", + "version": { + "version_data": [ + { + "version_value": "FortiManager 7.0.0, 6.4.6; FortiAnalyzer 7.0.0, 6.4.6" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "None", + "baseScore": 3.0, + "baseSeverity": "Low", + "confidentialityImpact": "Low", + "integrityImpact": "None", + "privilegesRequired": "High", + "scope": "Changed", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N/E:F/RL:O/RC:C", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-21-112", + "url": "https://fortiguard.com/advisory/FG-IR-21-112" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An information disclosure vulnerability [CWE-200] in FortiAnalyzerVM and FortiManagerVM versions 7.0.0 and 6.4.6 and below may allow an authenticated attacker to read the FortiCloud credentials which were used to activate the trial license in cleartext." } ] } diff --git a/2021/36xxx/CVE-2021-36175.json b/2021/36xxx/CVE-2021-36175.json index e7a59a5f65c..717e8a7af9a 100644 --- a/2021/36xxx/CVE-2021-36175.json +++ b/2021/36xxx/CVE-2021-36175.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-36175", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiWebManager", + "version": { + "version_data": [ + { + "version_value": "FortiWebManager 6.0.2 6.2.3" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 4.0, + "baseSeverity": "Medium", + "confidentialityImpact": "None", + "integrityImpact": "Low", + "privilegesRequired": "Low", + "scope": "Changed", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N/E:F/RL:X/RC:X", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-027", + "url": "https://fortiguard.com/advisory/FG-IR-20-027" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of input vulnerability [CWE-79] in FortiWebManager versions 6.2.3 and below, 6.0.2 and below may allow a remote authenticated attacker to inject malicious script/tags via the name/description/comments parameter of various sections of the device." } ] } diff --git a/2021/36xxx/CVE-2021-36178.json b/2021/36xxx/CVE-2021-36178.json index b517be637b5..5742c388c76 100644 --- a/2021/36xxx/CVE-2021-36178.json +++ b/2021/36xxx/CVE-2021-36178.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-36178", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiSDNConnector", + "version": { + "version_data": [ + { + "version_value": "FortiSDNConnector 1.1.7, 1.1.6, 1.1.5, 1.1.4, 1.1.3, 1.1.2, 1.1.1, 1.1.0, 1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 4.2, + "baseSeverity": "Medium", + "confidentialityImpact": "Low", + "integrityImpact": "None", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:X", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-183", + "url": "https://fortiguard.com/advisory/FG-IR-20-183" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A insufficiently protected credentials in Fortinet FortiSDNConnector version 1.1.7 and below allows attacker to disclose third-party devices credential information via configuration page lookup." } ] } diff --git a/2021/36xxx/CVE-2021-36298.json b/2021/36xxx/CVE-2021-36298.json index 725614368db..6a9c445e32e 100644 --- a/2021/36xxx/CVE-2021-36298.json +++ b/2021/36xxx/CVE-2021-36298.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-09-17", "ID": "CVE-2021-36298", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Isilon InsightIQ", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "4.1.4" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 8.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/000191604", + "name": "https://www.dell.com/support/kbdoc/000191604" } ] } diff --git a/2021/36xxx/CVE-2021-36309.json b/2021/36xxx/CVE-2021-36309.json index 3c930729476..2325b81b049 100644 --- a/2021/36xxx/CVE-2021-36309.json +++ b/2021/36xxx/CVE-2021-36309.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-09-17", "ID": "CVE-2021-36309", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Enterprise SONiC OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "3.4.0" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\\Radius credentials stored to read sensitive information and use it in further attacks." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256: Unprotected Storage of Credentials" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000191690/DSA-2021-190-Dell-Enterprise-SONiC-OS-Security-Update-for-an-information-disclosure-Vulnerability", + "name": "https://www.dell.com/support/kbdoc/en-us/000191690/DSA-2021-190-Dell-Enterprise-SONiC-OS-Security-Update-for-an-information-disclosure-Vulnerability" } ] } diff --git a/2021/36xxx/CVE-2021-36767.json b/2021/36xxx/CVE-2021-36767.json index 9c95606e220..5c4f5dab9da 100644 --- a/2021/36xxx/CVE-2021-36767.json +++ b/2021/36xxx/CVE-2021-36767.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-36767", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-36767", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Digi RealPort through 4.8.488.0, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt", + "url": "https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt" } ] } diff --git a/2021/36xxx/CVE-2021-36850.json b/2021/36xxx/CVE-2021-36850.json index a53733ca538..0a51d5e47e2 100644 --- a/2021/36xxx/CVE-2021-36850.json +++ b/2021/36xxx/CVE-2021-36850.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "audit@patchstack.com", + "DATE_PUBLIC": "2021-04-08T23:09:00.000Z", "ID": "CVE-2021-36850", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WordPress Media File Renamer \u2013 Auto & Manual Rename plugin <= 5.1.9 - Cross-Site Request Forgery (CSRF) vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Media File Renamer \u2013 Auto & Manual Rename (WordPress plugin)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "<= 5.1.9", + "version_value": "5.1.9" + } + ] + } + } + ] + }, + "vendor_name": "Meow Apps" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Original researcher - Ngo Van Thien (Patchstack Red Team)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WordPress Media File Renamer \u2013 Auto & Manual Rename plugin (versions <= 5.1.9). Affected parameters \"post_title\", \"filename\", \"lock\". This allows changing the uploaded media title, media file name, and media locking state." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://wordpress.org/plugins/media-file-renamer/#developers", + "refsource": "CONFIRM", + "url": "https://wordpress.org/plugins/media-file-renamer/#developers" + }, + { + "name": "https://patchstack.com/database/vulnerability/media-file-renamer/wordpress-media-file-renamer-plugin-5-1-9-multiple-cross-site-request-forgery-csrf-vulnerabilities", + "refsource": "MISC", + "url": "https://patchstack.com/database/vulnerability/media-file-renamer/wordpress-media-file-renamer-plugin-5-1-9-multiple-cross-site-request-forgery-csrf-vulnerabilities" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to 5.2.0 or higher version." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36942.json b/2021/36xxx/CVE-2021-36942.json index ef217d197ee..8cdc729de7a 100644 --- a/2021/36xxx/CVE-2021-36942.json +++ b/2021/36xxx/CVE-2021-36942.json @@ -111,6 +111,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CERT-VN", + "name": "VU#405600", + "url": "https://www.kb.cert.org/vuls/id/405600" + }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36942", "refsource": "MISC", diff --git a/2021/37xxx/CVE-2021-37223.json b/2021/37xxx/CVE-2021-37223.json index c6ee0fbb318..a3186777b72 100644 --- a/2021/37xxx/CVE-2021-37223.json +++ b/2021/37xxx/CVE-2021-37223.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37223", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37223", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Nagios Enterprises NagiosXI <= 5.8.4 contains a Server-Side Request Forgery (SSRF) vulnerability in schedulereport.php. Any authenticated user can create scheduled reports containing PDF screenshots of any view in the NagiosXI application. Due to lack of input sanitisation, the target page can be replaced with an SSRF payload to access internal resources or disclose local system files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.nagios.com/downloads/nagios-xi/change-log/", + "url": "https://www.nagios.com/downloads/nagios-xi/change-log/" + }, + { + "url": "http://nagios.com", + "refsource": "MISC", + "name": "http://nagios.com" } ] } diff --git a/2021/37xxx/CVE-2021-37330.json b/2021/37xxx/CVE-2021-37330.json index 4130dbd9ee2..3397d57cac2 100644 --- a/2021/37xxx/CVE-2021-37330.json +++ b/2021/37xxx/CVE-2021-37330.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37330", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37330", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Laravel Booking System Booking Core 2.0 is vulnerable to Cross Site Scripting (XSS). The Avatar upload in the My Profile section could be exploited to upload a malicious SVG file which contains Javascript. Now if another user/admin views the profile and clicks to view his avatar, an XSS will trigger." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.navidkagalwalla.com/booking-core-vulnerabilities", + "url": "https://www.navidkagalwalla.com/booking-core-vulnerabilities" } ] } diff --git a/2021/37xxx/CVE-2021-37331.json b/2021/37xxx/CVE-2021-37331.json index a4ef3644c49..4d05f7d97e4 100644 --- a/2021/37xxx/CVE-2021-37331.json +++ b/2021/37xxx/CVE-2021-37331.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37331", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37331", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Laravel Booking System Booking Core 2.0 is vulnerable to Incorrect Access Control. On the Verifications page, after uploading an ID Card or Trade License and viewing it, ID Cards and Trade Licenses of other vendors/users can be viewed by changing the URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.navidkagalwalla.com/booking-core-vulnerabilities", + "url": "https://www.navidkagalwalla.com/booking-core-vulnerabilities" } ] } diff --git a/2021/37xxx/CVE-2021-37333.json b/2021/37xxx/CVE-2021-37333.json index 3f55f0baa36..403b3c9898f 100644 --- a/2021/37xxx/CVE-2021-37333.json +++ b/2021/37xxx/CVE-2021-37333.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37333", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37333", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Laravel Booking System Booking Core 2.0 is vulnerable to Session Management. A password change at sandbox.bookingcore.org/user/profile/change-password does not invalidate a session that is opened in a different browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.navidkagalwalla.com/booking-core-vulnerabilities", + "url": "https://www.navidkagalwalla.com/booking-core-vulnerabilities" } ] } diff --git a/2021/37xxx/CVE-2021-37750.json b/2021/37xxx/CVE-2021-37750.json index 0f72745710e..735c1f1449c 100644 --- a/2021/37xxx/CVE-2021-37750.json +++ b/2021/37xxx/CVE-2021-37750.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210923-0002/", "url": "https://security.netapp.com/advisory/ntap-20210923-0002/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" } ] } diff --git a/2021/37xxx/CVE-2021-37762.json b/2021/37xxx/CVE-2021-37762.json index 90f9de6e64e..582f652dd0c 100644 --- a/2021/37xxx/CVE-2021-37762.json +++ b/2021/37xxx/CVE-2021-37762.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37762", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37762", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file overwrite leading to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37777.json b/2021/37xxx/CVE-2021-37777.json index 76da228691c..f9632c2a0d2 100644 --- a/2021/37xxx/CVE-2021-37777.json +++ b/2021/37xxx/CVE-2021-37777.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37777", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37777", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Gila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR). Thumbnails uploaded by one site owner are visible by another site owner just by knowing the other site name and fuzzing for picture names. This leads to sensitive information disclosure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.navidkagalwalla.com/gila-cms-vulnerabilities", + "url": "https://www.navidkagalwalla.com/gila-cms-vulnerabilities" } ] } diff --git a/2021/37xxx/CVE-2021-37918.json b/2021/37xxx/CVE-2021-37918.json index 19fe01485dd..ce39e97e6e3 100644 --- a/2021/37xxx/CVE-2021-37918.json +++ b/2021/37xxx/CVE-2021-37918.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37918", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37918", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37919.json b/2021/37xxx/CVE-2021-37919.json index fda02b450cb..6a9d6e1c486 100644 --- a/2021/37xxx/CVE-2021-37919.json +++ b/2021/37xxx/CVE-2021-37919.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37919", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37919", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37920.json b/2021/37xxx/CVE-2021-37920.json index e89f59d98c8..8ab48994ae3 100644 --- a/2021/37xxx/CVE-2021-37920.json +++ b/2021/37xxx/CVE-2021-37920.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37920", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37920", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37921.json b/2021/37xxx/CVE-2021-37921.json index eeb9fabea9b..1e040f6e2b0 100644 --- a/2021/37xxx/CVE-2021-37921.json +++ b/2021/37xxx/CVE-2021-37921.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37921", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37921", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37922.json b/2021/37xxx/CVE-2021-37922.json index b07c6078d7e..2ddc34f4e4a 100644 --- a/2021/37xxx/CVE-2021-37922.json +++ b/2021/37xxx/CVE-2021-37922.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37922", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37922", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior is vulnerable to path traversal which allows copying of files from one directory to another." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37923.json b/2021/37xxx/CVE-2021-37923.json index 4ce6665d1dc..f297af7540a 100644 --- a/2021/37xxx/CVE-2021-37923.json +++ b/2021/37xxx/CVE-2021-37923.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37923", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37923", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37924.json b/2021/37xxx/CVE-2021-37924.json index ba175303ea7..5ec7f84f2a1 100644 --- a/2021/37xxx/CVE-2021-37924.json +++ b/2021/37xxx/CVE-2021-37924.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37924", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37924", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37926.json b/2021/37xxx/CVE-2021-37926.json index eb5dc04276a..c614ed6486d 100644 --- a/2021/37xxx/CVE-2021-37926.json +++ b/2021/37xxx/CVE-2021-37926.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37926", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37926", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37928.json b/2021/37xxx/CVE-2021-37928.json index 9ae191b189b..4ce9ec39691 100644 --- a/2021/37xxx/CVE-2021-37928.json +++ b/2021/37xxx/CVE-2021-37928.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37928", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37928", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37929.json b/2021/37xxx/CVE-2021-37929.json index a9aa305b7b6..c90a322e411 100644 --- a/2021/37xxx/CVE-2021-37929.json +++ b/2021/37xxx/CVE-2021-37929.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37929", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37929", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37930.json b/2021/37xxx/CVE-2021-37930.json index d498dea32cc..9622bcc2e47 100644 --- a/2021/37xxx/CVE-2021-37930.json +++ b/2021/37xxx/CVE-2021-37930.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37930", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37930", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/37xxx/CVE-2021-37931.json b/2021/37xxx/CVE-2021-37931.json index 4b3765d2a46..3293a9cf6a5 100644 --- a/2021/37xxx/CVE-2021-37931.json +++ b/2021/37xxx/CVE-2021-37931.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37931", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37931", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/38xxx/CVE-2021-38096.json b/2021/38xxx/CVE-2021-38096.json index 8de5b40dd44..50e8e7340b5 100644 --- a/2021/38xxx/CVE-2021-38096.json +++ b/2021/38xxx/CVE-2021-38096.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38096", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38096", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Coreip.dll in Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-025", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-025" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38097.json b/2021/38xxx/CVE-2021-38097.json index a2a0dcd2d51..e2d7b4c194b 100644 --- a/2021/38xxx/CVE-2021-38097.json +++ b/2021/38xxx/CVE-2021-38097.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38097", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38097", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-026", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-026" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38098.json b/2021/38xxx/CVE-2021-38098.json index 3380115f16b..b6508ef51ca 100644 --- a/2021/38xxx/CVE-2021-38098.json +++ b/2021/38xxx/CVE-2021-38098.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38098", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38098", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Corel PDF Fusion 2.6.2.0 is affected by a Heap Corruption vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-027", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-027" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38099.json b/2021/38xxx/CVE-2021-38099.json index 2a830fb4f96..1d6ead8e2f0 100644 --- a/2021/38xxx/CVE-2021-38099.json +++ b/2021/38xxx/CVE-2021-38099.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38099", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38099", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38101." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-030", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-030" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38100.json b/2021/38xxx/CVE-2021-38100.json index 727aa3c15b7..0f56d1bb715 100644 --- a/2021/38xxx/CVE-2021-38100.json +++ b/2021/38xxx/CVE-2021-38100.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38100", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38100", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-029", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-029" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38101.json b/2021/38xxx/CVE-2021-38101.json index 7e31c2395b4..a9ade1c2e00 100644 --- a/2021/38xxx/CVE-2021-38101.json +++ b/2021/38xxx/CVE-2021-38101.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38101", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38101", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38099." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-028", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-028" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38102.json b/2021/38xxx/CVE-2021-38102.json index bfa57988ead..6000ab7ab46 100644 --- a/2021/38xxx/CVE-2021-38102.json +++ b/2021/38xxx/CVE-2021-38102.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38102", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38102", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38105." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-035", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-035" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38103.json b/2021/38xxx/CVE-2021-38103.json index 0f1d0520224..6d71ada57ce 100644 --- a/2021/38xxx/CVE-2021-38103.json +++ b/2021/38xxx/CVE-2021-38103.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38103", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38103", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBJPG2.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-031", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-031" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38104.json b/2021/38xxx/CVE-2021-38104.json index 48ac18831b7..e01755bc2f5 100644 --- a/2021/38xxx/CVE-2021-38104.json +++ b/2021/38xxx/CVE-2021-38104.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38104", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38104", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IPPP72.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-032", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-032" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38105.json b/2021/38xxx/CVE-2021-38105.json index 042dfc6516f..9f6dd3458ed 100644 --- a/2021/38xxx/CVE-2021-38105.json +++ b/2021/38xxx/CVE-2021-38105.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38105", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38105", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38102." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-033", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-033" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38106.json b/2021/38xxx/CVE-2021-38106.json index bf68258a5ec..5956aec2447 100644 --- a/2021/38xxx/CVE-2021-38106.json +++ b/2021/38xxx/CVE-2021-38106.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38106", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38106", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "UAX200.dll in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-034", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-034" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38107.json b/2021/38xxx/CVE-2021-38107.json index 9d8303c2549..1d6f28f5bb3 100644 --- a/2021/38xxx/CVE-2021-38107.json +++ b/2021/38xxx/CVE-2021-38107.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38107", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38107", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CdrCore.dll in Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-039", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-039" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38108.json b/2021/38xxx/CVE-2021-38108.json index 6c736cd5abf..022cc08e8ea 100644 --- a/2021/38xxx/CVE-2021-38108.json +++ b/2021/38xxx/CVE-2021-38108.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38108", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38108", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-037", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-037" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38109.json b/2021/38xxx/CVE-2021-38109.json index a575cbe90bb..71809bfcf22 100644 --- a/2021/38xxx/CVE-2021-38109.json +++ b/2021/38xxx/CVE-2021-38109.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38109", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38109", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-038", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-038" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38110.json b/2021/38xxx/CVE-2021-38110.json index 970e3539ff3..d41c0d8b48d 100644 --- a/2021/38xxx/CVE-2021-38110.json +++ b/2021/38xxx/CVE-2021-38110.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38110", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38110", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.fortiguard.com/zeroday/FG-VD-21-036", + "refsource": "MISC", + "name": "https://www.fortiguard.com/zeroday/FG-VD-21-036" + }, + { + "refsource": "MISC", + "name": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products", + "url": "https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products" } ] } diff --git a/2021/38xxx/CVE-2021-38153.json b/2021/38xxx/CVE-2021-38153.json index a98b2e59212..86653d416d5 100644 --- a/2021/38xxx/CVE-2021-38153.json +++ b/2021/38xxx/CVE-2021-38153.json @@ -113,6 +113,11 @@ "refsource": "MISC", "url": "https://kafka.apache.org/cve-list", "name": "https://kafka.apache.org/cve-list" + }, + { + "refsource": "MLIST", + "name": "[kafka-dev] 20211007 Re: CVE Back Port?", + "url": "https://lists.apache.org/thread.html/r35322aec467ddae34002690edaa4d9f16e7df9b5bf7164869b75b62c@%3Cdev.kafka.apache.org%3E" } ] }, diff --git a/2021/38xxx/CVE-2021-38298.json b/2021/38xxx/CVE-2021-38298.json index a418489b8bb..9e50b8bf509 100644 --- a/2021/38xxx/CVE-2021-38298.json +++ b/2021/38xxx/CVE-2021-38298.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38298", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38298", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus before 7110 is vulnerable to blind XXE." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7110", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7110" } ] } diff --git a/2021/38xxx/CVE-2021-38300.json b/2021/38xxx/CVE-2021-38300.json index c881bbee82a..f1af74fd5cd 100644 --- a/2021/38xxx/CVE-2021-38300.json +++ b/2021/38xxx/CVE-2021-38300.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2021/09/15/5", "url": "http://www.openwall.com/lists/oss-security/2021/09/15/5" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0003/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0003/" } ] } diff --git a/2021/38xxx/CVE-2021-38392.json b/2021/38xxx/CVE-2021-38392.json index a063f22050f..63dd1483e43 100644 --- a/2021/38xxx/CVE-2021-38392.json +++ b/2021/38xxx/CVE-2021-38392.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2021-09-30T21:02:00.000Z", "ID": "CVE-2021-38392", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Improper Access Control for Boston Scientific Zoom Latitude" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ZOOM LATITUDE", + "version": { + "version_data": [ + { + "version_value": "Model 3120" + } + ] + } + } + ] + }, + "vendor_name": "Boston Scientific" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Endres Puschner - Max Planck Institute for Security and Privacy, Bochum, Christoph Saatjohann - FH M\u00fcnster University of Applied Sciences, Christian Dresen - FH M\u00fcnster University of Applied Sciences, and Markus Willing - University of Muenster, discovered these issues as part of broader academic research of cardiac devices and reported them to Boston Scientific." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A skilled attacker with physical access to the affected device can gain access to the hard disk drive of the device to change the telemetry region and could use this setting to interrogate or program an implantable device in any region in the world." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01" + } + ] + }, + "source": { + "advisory": "ICSMA-21-273-01", + "defect": [ + "CWE-284" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Boston Scientific is in the process of transitioning all users to a replacement programmer with enhanced security, the LATITUDE Programming System, Model 3300. Boston Scientific will not issue a product update to address the identified vulnerabilities in the ZOOM LATITUDE Programming System, Model 3120." + } + ] } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38394.json b/2021/38xxx/CVE-2021-38394.json index d8f80284ad1..524c6e202cd 100644 --- a/2021/38xxx/CVE-2021-38394.json +++ b/2021/38xxx/CVE-2021-38394.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2021-09-30T21:02:00.000Z", "ID": "CVE-2021-38394", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Missing Protection against Hardware Reverse Engineering Using Integrated Circuit Imaging Techniques for Boston Scientific Zoom Latitude" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ZOOM LATITUDE", + "version": { + "version_data": [ + { + "version_value": "Model 3120" + } + ] + } + } + ] + }, + "vendor_name": "Boston Scientific" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Endres Puschner - Max Planck Institute for Security and Privacy, Bochum, Christoph Saatjohann - FH M\u00fcnster University of Applied Sciences, Christian Dresen - FH M\u00fcnster University of Applied Sciences, and Markus Willing - University of Muenster, discovered these issues as part of broader academic research of cardiac devices and reported them to Boston Scientific." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1278 " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01" + } + ] + }, + "source": { + "advisory": "ICSMA-21-273-01", + "defect": [ + "CWE-1278" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Boston Scientific is in the process of transitioning all users to a replacement programmer with enhanced security, the LATITUDE Programming System, Model 3300. Boston Scientific will not issue a product update to address the identified vulnerabilities in the ZOOM LATITUDE Programming System, Model 3120." + } + ] } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38396.json b/2021/38xxx/CVE-2021-38396.json index e4cc161d347..f575d6cc55b 100644 --- a/2021/38xxx/CVE-2021-38396.json +++ b/2021/38xxx/CVE-2021-38396.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2021-09-30T21:02:00.000Z", "ID": "CVE-2021-38396", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Missing Support Integrity Check for Boston Scientific Zoom Latitude" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ZOOM LATITUDE", + "version": { + "version_data": [ + { + "version_value": "Model 3120" + } + ] + } + } + ] + }, + "vendor_name": "Boston Scientific" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Endres Puschner - Max Planck Institute for Security and Privacy, Bochum, Christoph Saatjohann - FH M\u00fcnster University of Applied Sciences, Christian Dresen - FH M\u00fcnster University of Applied Sciences, and Markus Willing - University of Muenster, discovered these issues as part of broader academic research of cardiac devices and reported them to Boston Scientific." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted USB." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-353 Missing Support for Integrity Check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01" + } + ] + }, + "source": { + "advisory": "ICSMA-21-273-01", + "defect": [ + "CWE-353" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Boston Scientific is in the process of transitioning all users to a replacement programmer with enhanced security, the LATITUDE Programming System, Model 3300. Boston Scientific will not issue a product update to address the identified vulnerabilities in the ZOOM LATITUDE Programming System, Model 3120." + } + ] } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38398.json b/2021/38xxx/CVE-2021-38398.json index 5f0f69086d5..de35dbc52bd 100644 --- a/2021/38xxx/CVE-2021-38398.json +++ b/2021/38xxx/CVE-2021-38398.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2021-09-30T21:02:00.000Z", "ID": "CVE-2021-38398", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Reliance on Component that is not Updateable for Boston Scientific Zoom Latitude" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ZOOM LATITUDE", + "version": { + "version_data": [ + { + "version_value": "Model 3120" + } + ] + } + } + ] + }, + "vendor_name": "Boston Scientific" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Endres Puschner - Max Planck Institute for Security and Privacy, Bochum, Christoph Saatjohann - FH M\u00fcnster University of Applied Sciences, Christian Dresen - FH M\u00fcnster University of Applied Sciences, and Markus Willing - University of Muenster, discovered these issues as part of broader academic research of cardiac devices and reported them to Boston Scientific." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1329 " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01" + } + ] + }, + "source": { + "advisory": "ICSMA-21-273-01", + "defect": [ + "CWE-1329" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Boston Scientific is in the process of transitioning all users to a replacement programmer with enhanced security, the LATITUDE Programming System, Model 3300. Boston Scientific will not issue a product update to address the identified vulnerabilities in the ZOOM LATITUDE Programming System, Model 3120." + } + ] } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38400.json b/2021/38xxx/CVE-2021-38400.json index ef055d7716a..bb30b62ce2d 100644 --- a/2021/38xxx/CVE-2021-38400.json +++ b/2021/38xxx/CVE-2021-38400.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2021-09-30T21:02:00.000Z", "ID": "CVE-2021-38400", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Use of Password Hash with Insufficient Computational Effort for Boston Scientific Zoom Latitude" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ZOOM LATITUDE", + "version": { + "version_data": [ + { + "version_value": "Model 3120" + } + ] + } + } + ] + }, + "vendor_name": "Boston Scientific" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Endres Puschner - Max Planck Institute for Security and Privacy, Bochum, Christoph Saatjohann - FH M\u00fcnster University of Applied Sciences, Christian Dresen - FH M\u00fcnster University of Applied Sciences, and Markus Willing - University of Muenster, discovered these issues as part of broader academic research of cardiac devices and reported them to Boston Scientific." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An attacker with physical access to Boston Scientific Zoom Latitude Model 3120 can remove the hard disk drive or create a specially crafted USB to extract the password hash for brute force reverse engineering of the system password." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-916 Use of Password Hash With Insufficient Computational Effort" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01" + } + ] + }, + "source": { + "advisory": "ICSMA-21-273-01", + "defect": [ + "CWE-916" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Boston Scientific is in the process of transitioning all users to a replacement programmer with enhanced security, the LATITUDE Programming System, Model 3300. Boston Scientific will not issue a product update to address the identified vulnerabilities in the ZOOM LATITUDE Programming System, Model 3120." + } + ] } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38618.json b/2021/38xxx/CVE-2021-38618.json index 16943e1cb83..a9999e013d5 100644 --- a/2021/38xxx/CVE-2021-38618.json +++ b/2021/38xxx/CVE-2021-38618.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38618", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38618", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In GFOS Workforce Management 4.8.272.1, the login page of application is prone to authentication bypass, allowing anyone (who knows a user's credentials except the password) to get access to an account. This occurs because of JSESSIONID mismanagement." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://excellium-services.com/cert-xlm-advisory/cve-2021-38618/", + "url": "https://excellium-services.com/cert-xlm-advisory/cve-2021-38618/" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:H/AV:N/A:N/C:H/I:H/PR:N/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38675.json b/2021/38xxx/CVE-2021-38675.json index c58b57f7669..1a9af694c16 100644 --- a/2021/38xxx/CVE-2021-38675.json +++ b/2021/38xxx/CVE-2021-38675.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@qnap.com", + "DATE_PUBLIC": "2021-10-01T10:26:00.000Z", "ID": "CVE-2021-38675", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored XSS Vulnerability in Image2PDF" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Image2PDF", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2.1.5 ( 2021/08/17 )" + } + ] + } + } + ] + }, + "vendor_name": "QNAP Systems Inc." + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Tony Martin, a security researcher" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Image2PDF. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Image2PDF: Image2PDF 2.1.5 ( 2021/08/17 ) and later" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.qnap.com/en/security-advisory/qsa-21-43", + "name": "https://www.qnap.com/en/security-advisory/qsa-21-43" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "We have already fixed this vulnerability in the following versions of Image2PDF:\nImage2PDF 2.1.5 ( 2021/08/17 ) and later\n" + } + ], + "source": { + "advisory": "QSA-21-43", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38714.json b/2021/38xxx/CVE-2021-38714.json index 0b59a1933e9..00bcaa0dd03 100644 --- a/2021/38xxx/CVE-2021-38714.json +++ b/2021/38xxx/CVE-2021-38714.json @@ -56,6 +56,11 @@ "url": "https://sourceforge.net/p/plib/bugs/55/", "refsource": "MISC", "name": "https://sourceforge.net/p/plib/bugs/55/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2775-1] plib security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00000.html" } ] } diff --git a/2021/38xxx/CVE-2021-38822.json b/2021/38xxx/CVE-2021-38822.json index 0bf51194ec4..db3ecd15012 100644 --- a/2021/38xxx/CVE-2021-38822.json +++ b/2021/38xxx/CVE-2021-38822.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38822", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38822", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Stored Cross Site Scripting vulnerability via Malicious File Upload exists in multiple pages of IceHrm 30.0.0.OS that allows for arbitrary execution of JavaScript commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.navidkagalwalla.com/icehrm-vulnerabilities", + "url": "https://www.navidkagalwalla.com/icehrm-vulnerabilities" } ] } diff --git a/2021/38xxx/CVE-2021-38823.json b/2021/38xxx/CVE-2021-38823.json index 42c18ab2053..ce2baf72211 100644 --- a/2021/38xxx/CVE-2021-38823.json +++ b/2021/38xxx/CVE-2021-38823.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-38823", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-38823", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The IceHrm 30.0.0 OS website was found vulnerable to Session Management Issue. A signout from an admin account does not invalidate an admin session that is opened in a different browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.navidkagalwalla.com/icehrm-vulnerabilities", + "url": "https://www.navidkagalwalla.com/icehrm-vulnerabilities" } ] } diff --git a/2021/38xxx/CVE-2021-38923.json b/2021/38xxx/CVE-2021-38923.json index c085f489b85..f6264e288ce 100644 --- a/2021/38xxx/CVE-2021-38923.json +++ b/2021/38xxx/CVE-2021-38923.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "FW1010" + } + ] + }, + "product_name": "PowerVM Hypervisor" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, "CVE_data_meta": { - "ID": "CVE-2021-38923", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC", + "ID": "CVE-2021-38923" + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6495879", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6495879", + "title": "IBM Security Bulletin 6495879 (PowerVM Hypervisor)" + }, + { + "name": "ibm-powervm-cve202138923-sec-bypass (210162)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/210162", + "refsource": "XF", + "title": "X-Force Vulnerability Report" + } + ] }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM PowerVM Hypervisor FW1010 could allow a privileged user to gain access to another VM due to assigning duplicate WWPNs. IBM X-Force ID: 210162.", + "lang": "eng" } ] - } + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "S": "C", + "UI": "N", + "SCORE": "8.000", + "PR": "H", + "AC": "H", + "I": "H", + "A": "H", + "AV": "N", + "C": "H" + } + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Bypass Security" + } + ] + } + ] + }, + "data_type": "CVE", + "data_format": "MITRE" } \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38925.json b/2021/38xxx/CVE-2021-38925.json index 2e54352354e..11f6f9f20e3 100644 --- a/2021/38xxx/CVE-2021-38925.json +++ b/2021/38xxx/CVE-2021-38925.json @@ -1,17 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-38925", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Sterling B2B Integrator", + "version": { + "version_data": [ + { + "version_value": "5.2.0.0" + }, + { + "version_value": "6.1.0.0" + }, + { + "version_value": "6.0.3.4" + }, + { + "version_value": "6.1.0.3" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } }, "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.", + "lang": "eng" + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6495905", + "url": "https://www.ibm.com/support/pages/node/6495905", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6495905 (Sterling B2B Integrator)" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/210171", + "name": "ibm-sterling-cve202138925-info-disc (210171)", + "title": "X-Force Vulnerability Report" + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "C": "H", + "AC": "H", + "S": "U", + "I": "N", + "AV": "N", + "UI": "N", + "SCORE": "5.900", + "PR": "N", + "A": "N" + } + } + }, + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-38925", + "DATE_PUBLIC": "2021-10-05T00:00:00", + "STATE": "PUBLIC" + }, + "data_type": "CVE", + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] } ] } diff --git a/2021/39xxx/CVE-2021-39216.json b/2021/39xxx/CVE-2021-39216.json index 2e9162fdd58..33b043cf41c 100644 --- a/2021/39xxx/CVE-2021-39216.json +++ b/2021/39xxx/CVE-2021-39216.json @@ -88,6 +88,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-68713440cb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-1805eacb48", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/" } ] }, diff --git a/2021/39xxx/CVE-2021-39218.json b/2021/39xxx/CVE-2021-39218.json index 3f032bffac3..ecbf94cd829 100644 --- a/2021/39xxx/CVE-2021-39218.json +++ b/2021/39xxx/CVE-2021-39218.json @@ -104,6 +104,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-68713440cb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-1805eacb48", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/" } ] }, diff --git a/2021/39xxx/CVE-2021-39219.json b/2021/39xxx/CVE-2021-39219.json index 16fce8acf4b..101b966c99a 100644 --- a/2021/39xxx/CVE-2021-39219.json +++ b/2021/39xxx/CVE-2021-39219.json @@ -88,6 +88,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-68713440cb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-1805eacb48", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/" } ] }, diff --git a/2021/39xxx/CVE-2021-39226.json b/2021/39xxx/CVE-2021-39226.json index 9167e72fcfb..925009076b8 100644 --- a/2021/39xxx/CVE-2021-39226.json +++ b/2021/39xxx/CVE-2021-39226.json @@ -1,18 +1,106 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39226", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": " Snapshot authentication bypass in grafana" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "grafana", + "version": { + "version_data": [ + { + "version_value": ">= 8.0.0, < 8.1.6" + }, + { + "version_value": "< 7.5.11" + } + ] + } + } + ] + }, + "vendor_name": "grafana" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9", + "refsource": "CONFIRM", + "url": "https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9" + }, + { + "name": "https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269", + "refsource": "MISC", + "url": "https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269" + }, + { + "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/", + "refsource": "MISC", + "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/" + }, + { + "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/", + "refsource": "MISC", + "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211005 CVE-2021-39226 Grafana snapshot authentication bypass", + "url": "http://www.openwall.com/lists/oss-security/2021/10/05/4" + } + ] + }, + "source": { + "advisory": "GHSA-69j6-29vr-p3j9", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39270.json b/2021/39xxx/CVE-2021-39270.json index ff0061c9c89..0d48b7e7a5b 100644 --- a/2021/39xxx/CVE-2021-39270.json +++ b/2021/39xxx/CVE-2021-39270.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "responsible-disclosure@pingidentity.com", "ID": "CVE-2021-39270", "STATE": "PUBLIC" }, @@ -11,18 +11,48 @@ "product": { "product_data": [ { - "product_name": "n/a", + "product_name": "RSA SecurID Integration Kit", "version": { "version_data": [ { - "version_value": "n/a" + "version_value": "3.0" + } + ] + } + }, + { + "product_name": "RSA SecurID Integration Kit", + "version": { + "version_data": [ + { + "version_value": "3.0.1" + } + ] + } + }, + { + "product_name": "RSA SecurID Integration Kit", + "version": { + "version_data": [ + { + "version_value": "3.1" + } + ] + } + }, + { + "product_name": "RSA SecurID Integration Kit", + "version": { + "version_data": [ + { + "version_value": "3.1.1" } ] } } ] }, - "vendor_name": "n/a" + "vendor_name": "Ping Identity" } ] } @@ -44,7 +74,7 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Incorrect Access Control" } ] } diff --git a/2021/39xxx/CVE-2021-39275.json b/2021/39xxx/CVE-2021-39275.json index 648fdc0af24..a6e93830c6d 100644 --- a/2021/39xxx/CVE-2021-39275.json +++ b/2021/39xxx/CVE-2021-39275.json @@ -103,6 +103,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-e3f6dd670d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0004/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0004/" } ] }, diff --git a/2021/39xxx/CVE-2021-39327.json b/2021/39xxx/CVE-2021-39327.json index 96ca49029ae..32e162c804c 100644 --- a/2021/39xxx/CVE-2021-39327.json +++ b/2021/39xxx/CVE-2021-39327.json @@ -91,6 +91,11 @@ "refsource": "MISC", "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail=", "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail=" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html", + "url": "http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39347.json b/2021/39xxx/CVE-2021-39347.json index 61dc2e5b8c1..ea0e8b23923 100644 --- a/2021/39xxx/CVE-2021-39347.json +++ b/2021/39xxx/CVE-2021-39347.json @@ -1,18 +1,106 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "Wordfence", + "ASSIGNER": "security@wordfence.com", + "DATE_PUBLIC": "2021-10-01T15:29:00.000Z", "ID": "CVE-2021-39347", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stripe for WooCommerce 3.0.0 - 3.3.9 Missing Authorization Controls to Financial Account Hijacking" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Stripe for WooCommerce", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "3.0.0 - 3.3.9", + "version_value": "3.0.0 - 3.3.9" + } + ] + } + } + ] + }, + "vendor_name": "Stripe for WooCommerce" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Margaux DABERT from Intrinsec" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347", + "name": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347" + }, + { + "refsource": "MISC", + "url": "https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php", + "name": "https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to version 3.3.10 or newer. " + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39350.json b/2021/39xxx/CVE-2021-39350.json index b5e46829c90..3cadf3a78b7 100644 --- a/2021/39xxx/CVE-2021-39350.json +++ b/2021/39xxx/CVE-2021-39350.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "Wordfence", + "ASSIGNER": "security@wordfence.com", + "DATE_PUBLIC": "2021-10-05T20:14:00.000Z", "ID": "CVE-2021-39350", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "FV Flowplayer Video Player <= 7.5.0.727 - 7.5.2.727 Reflected Cross-Site Scripting" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "FV Flowplayer Video Player", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "7.5.0.727 - 7.5.2.727", + "version_value": "7.5.2.727" + } + ] + } + } + ] + }, + "vendor_name": "FV Flowplayer Video Player" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Margaux DABERT from Intrinsec" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350", + "name": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350" + }, + { + "refsource": "MISC", + "url": "https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php", + "name": "https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to version 7.5.3.727 or newer. " + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39351.json b/2021/39xxx/CVE-2021-39351.json index 47186d02f76..3307b6112a6 100644 --- a/2021/39xxx/CVE-2021-39351.json +++ b/2021/39xxx/CVE-2021-39351.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "Wordfence", + "ASSIGNER": "security@wordfence.com", + "DATE_PUBLIC": "2021-10-05T20:14:00.000Z", "ID": "CVE-2021-39351", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WP Bannerize 2.0.0 - 4.0.2 - Authenticated SQL Injection" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "WP Bannerize ", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.0.0 - 4.0.2", + "version_value": " 4.0.2" + } + ] + } + } + ] + }, + "vendor_name": "WP Bannerize " + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Margaux DABERT from Intrinsec" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP Bannerize WordPress plugin is vulnerable to authenticated SQL injection via the id parameter found in the ~/Classes/wpBannerizeAdmin.php file which allows attackers to exfiltrate sensitive information from vulnerable sites. This issue affects versions 2.0.0 - 4.0.2." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351", + "name": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351" + }, + { + "refsource": "MISC", + "url": "https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681", + "name": "https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Uninstall plugin from site." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39433.json b/2021/39xxx/CVE-2021-39433.json index e867d9fd420..fbf82fd1497 100644 --- a/2021/39xxx/CVE-2021-39433.json +++ b/2021/39xxx/CVE-2021-39433.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-39433", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-39433", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://biqs-drive.be/", + "refsource": "MISC", + "name": "https://biqs-drive.be/" + }, + { + "refsource": "MISC", + "name": "https://github.com/PinkDraconian/CVE-2021-39433/blob/main/README.md", + "url": "https://github.com/PinkDraconian/CVE-2021-39433/blob/main/README.md" } ] } diff --git a/2021/39xxx/CVE-2021-39486.json b/2021/39xxx/CVE-2021-39486.json index 300f9ffd01e..839320a8880 100644 --- a/2021/39xxx/CVE-2021-39486.json +++ b/2021/39xxx/CVE-2021-39486.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-39486", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-39486", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Stored XSS via Malicious File Upload exists in Gila CMS version 2.2.0. An attacker can use this to steal cookies, passwords or to run arbitrary code on a victim's browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.navidkagalwalla.com/gila-cms-vulnerabilities", + "url": "https://www.navidkagalwalla.com/gila-cms-vulnerabilities" } ] } diff --git a/2021/39xxx/CVE-2021-39821.json b/2021/39xxx/CVE-2021-39821.json index c3d5a20c312..19949e1f4df 100644 --- a/2021/39xxx/CVE-2021-39821.json +++ b/2021/39xxx/CVE-2021-39821.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file." + "value": "Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) are affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file." } ] }, diff --git a/2021/39xxx/CVE-2021-39827.json b/2021/39xxx/CVE-2021-39827.json index 30b4796f34c..6e15dd3f749 100644 --- a/2021/39xxx/CVE-2021-39827.json +++ b/2021/39xxx/CVE-2021-39827.json @@ -58,14 +58,14 @@ "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", - "baseScore": 7.8, - "baseSeverity": "High", + "baseScore": 6.5, + "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "High", - "privilegesRequired": "None", + "privilegesRequired": "High", "scope": "Unchanged", "userInteraction": "Required", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, diff --git a/2021/39xxx/CVE-2021-39849.json b/2021/39xxx/CVE-2021-39849.json index 9d16ef2be16..23a309bc058 100644 --- a/2021/39xxx/CVE-2021-39849.json +++ b/2021/39xxx/CVE-2021-39849.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, diff --git a/2021/39xxx/CVE-2021-39850.json b/2021/39xxx/CVE-2021-39850.json index d5712eb834b..5d17587b3d6 100644 --- a/2021/39xxx/CVE-2021-39850.json +++ b/2021/39xxx/CVE-2021-39850.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, diff --git a/2021/39xxx/CVE-2021-39851.json b/2021/39xxx/CVE-2021-39851.json index 332b6aace64..3e5f6976ade 100644 --- a/2021/39xxx/CVE-2021-39851.json +++ b/2021/39xxx/CVE-2021-39851.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, diff --git a/2021/39xxx/CVE-2021-39852.json b/2021/39xxx/CVE-2021-39852.json index 90b2adca514..6e889a724bc 100644 --- a/2021/39xxx/CVE-2021-39852.json +++ b/2021/39xxx/CVE-2021-39852.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, diff --git a/2021/39xxx/CVE-2021-39853.json b/2021/39xxx/CVE-2021-39853.json index d2b195d168f..4e32bed2de9 100644 --- a/2021/39xxx/CVE-2021-39853.json +++ b/2021/39xxx/CVE-2021-39853.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, diff --git a/2021/39xxx/CVE-2021-39854.json b/2021/39xxx/CVE-2021-39854.json index 09df64a3983..673422638ed 100644 --- a/2021/39xxx/CVE-2021-39854.json +++ b/2021/39xxx/CVE-2021-39854.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, diff --git a/2021/39xxx/CVE-2021-39860.json b/2021/39xxx/CVE-2021-39860.json index 633feae24ba..5822c5ee288 100644 --- a/2021/39xxx/CVE-2021-39860.json +++ b/2021/39xxx/CVE-2021-39860.json @@ -4,7 +4,7 @@ "DATE_PUBLIC": "2021-09-14T23:00:00.000Z", "ID": "CVE-2021-39860", "STATE": "PUBLIC", - "TITLE": "Adobe Acrobat Pro DC Search Plugin Null Pointer Dereference" + "TITLE": "Adobe Acrobat Reader DC Search Plugin Null Pointer Dereference" }, "affects": { "vendor": { @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Acrobat Pro DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to disclose sensitive user memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Acrobat Pro DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive user memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, @@ -57,15 +57,15 @@ "cvss": { "attackComplexity": "Low", "attackVector": "Local", - "availabilityImpact": "None", - "baseScore": 3.3, + "availabilityImpact": "High", + "baseScore": 5.5, "baseSeverity": "Medium", - "confidentialityImpact": "Low", + "confidentialityImpact": "None", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, diff --git a/2021/39xxx/CVE-2021-39861.json b/2021/39xxx/CVE-2021-39861.json index 7172c83e263..955fa123113 100644 --- a/2021/39xxx/CVE-2021-39861.json +++ b/2021/39xxx/CVE-2021-39861.json @@ -4,7 +4,7 @@ "DATE_PUBLIC": "2021-09-14T23:00:00.000Z", "ID": "CVE-2021-39861", "STATE": "PUBLIC", - "TITLE": "Adobe Acrobat Pro DC Catalog Plugin Out-of-Bounds Read Bug" + "TITLE": "Adobe Acrobat Reader DC Catalog Plugin Out-of-Bounds Read Bug" }, "affects": { "vendor": { diff --git a/2021/39xxx/CVE-2021-39866.json b/2021/39xxx/CVE-2021-39866.json index 83da35edea2..eed62b7f00f 100644 --- a/2021/39xxx/CVE-2021-39866.json +++ b/2021/39xxx/CVE-2021-39866.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39866", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.3, <14.3.1" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=13.6, <14.1.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Vulnerability in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/333175", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/333175", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1199561", + "url": "https://hackerone.com/reports/1199561", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39866.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39866.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A business logic error in the project deletion process in GitLab 13.6 and later allows persistent access via project access tokens." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39867.json b/2021/39xxx/CVE-2021-39867.json index 314b91bbe80..e7e64b0bfb3 100644 --- a/2021/39xxx/CVE-2021-39867.json +++ b/2021/39xxx/CVE-2021-39867.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39867", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.15, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reliance on reverse dns resolution for a security-critical action in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/214401", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/214401", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39867.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39867.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 8.15, a DNS rebinding vulnerability in Gitea Importer may be exploited by an attacker to trigger Server Side Request Forgery (SSRF) attacks." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was found internally by a member of the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39868.json b/2021/39xxx/CVE-2021-39868.json index 1fbb1877d18..d829613cc40 100644 --- a/2021/39xxx/CVE-2021-39868.json +++ b/2021/39xxx/CVE-2021-39868.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39868", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.12, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper input validation in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/24649", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/24649", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/420258", + "url": "https://hackerone.com/reports/420258", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39868.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39868.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 8.12, an authenticated low-privileged malicious user may create a project with unlimited repository size by modifying values in a project export." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ngalog for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39869.json b/2021/39xxx/CVE-2021-39869.json index a83a22d6697..376b18f320d 100644 --- a/2021/39xxx/CVE-2021-39869.json +++ b/2021/39xxx/CVE-2021-39869.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39869", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.9, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/27044", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/27044", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/497144", + "url": "https://hackerone.com/reports/497144", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39869.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39869.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 8.9, project exports may expose trigger tokens configured on that project." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @mishre for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39870.json b/2021/39xxx/CVE-2021-39870.json index 8e1747dabdf..855c5734431 100644 --- a/2021/39xxx/CVE-2021-39870.json +++ b/2021/39xxx/CVE-2021-39870.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39870", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=11.11, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://hackerone.com/reports/630263", + "url": "https://hackerone.com/reports/630263", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/29748", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/29748", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39870.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39870.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 11.11, an instance that has the setting to disable Repo by URL import enabled is bypassed by an attacker making a crafted API call." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ngalog for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39871.json b/2021/39xxx/CVE-2021-39871.json index 66f6691f9b2..0c5e0aff0dc 100644 --- a/2021/39xxx/CVE-2021-39871.json +++ b/2021/39xxx/CVE-2021-39871.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39871", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/340782", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/340782", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/630263", + "url": "https://hackerone.com/reports/630263", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39871.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39871.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 13.0, an instance that has the setting to disable Bitbucket Server import enabled is bypassed by an attacker making a crafted API call." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was discovered internally by a member of the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39872.json b/2021/39xxx/CVE-2021-39872.json index c5242706f3d..a26f9adb69c 100644 --- a/2021/39xxx/CVE-2021-39872.json +++ b/2021/39xxx/CVE-2021-39872.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39872", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.1, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/337954", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/337954", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1285226", + "url": "https://hackerone.com/reports/1285226", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39872.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39872.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 14.1, an improper access control vulnerability allows users with expired password to still access GitLab through git and API through access tokens acquired before password expiration." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ngalog for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39873.json b/2021/39xxx/CVE-2021-39873.json index 0d241b42c21..efde071eebf 100644 --- a/2021/39xxx/CVE-2021-39873.json +++ b/2021/39xxx/CVE-2021-39873.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39873", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=1.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient verification of data authenticity in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/27241", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/27241", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/504961", + "url": "https://hackerone.com/reports/504961", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39873.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39873.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE, there exists a content spoofing vulnerability which may be leveraged by attackers to trick users into visiting a malicious website by spoofing the content in an error response." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @w00t1 for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39874.json b/2021/39xxx/CVE-2021-39874.json index 2628c8c0327..f26b8e72b27 100644 --- a/2021/39xxx/CVE-2021-39874.json +++ b/2021/39xxx/CVE-2021-39874.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39874", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=11.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/222527", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/222527", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/898477", + "url": "https://hackerone.com/reports/898477", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39874.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39874.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 11.0, the requirement to enforce 2FA is not honored when using git commands." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @melar_dev for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39875.json b/2021/39xxx/CVE-2021-39875.json index a912dae60e5..8d18eb302e2 100644 --- a/2021/39xxx/CVE-2021-39875.json +++ b/2021/39xxx/CVE-2021-39875.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39875", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.6, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/290985", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/290985", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1048259", + "url": "https://hackerone.com/reports/1048259", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39875.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39875.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 13.6, it is possible to see pending invitations of any public group or public project by visiting an API endpoint." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39877.json b/2021/39xxx/CVE-2021-39877.json index afb974ae490..34c08bef253 100644 --- a/2021/39xxx/CVE-2021-39877.json +++ b/2021/39xxx/CVE-2021-39877.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39877", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.2, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/300095", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/300095", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1077021", + "url": "https://hackerone.com/reports/1077021", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39877.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39877.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was discovered in GitLab starting with version 12.2 that allows an attacker to cause uncontrolled resource consumption with a specially crafted file." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 7.7, + "baseSeverity": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks phill for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39878.json b/2021/39xxx/CVE-2021-39878.json index 05fc2f1a001..3d621c7d56f 100644 --- a/2021/39xxx/CVE-2021-39878.json +++ b/2021/39xxx/CVE-2021-39878.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39878", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/334043", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/334043", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1194254", + "url": "https://hackerone.com/reports/1194254", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39878.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39878.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored Reflected Cross-Site Scripting vulnerability in the Jira integration in GitLab version 13.0 up to 14.3.1 allowed an attacker to execute arbitrary javascript code." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks ooooooo_q for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39879.json b/2021/39xxx/CVE-2021-39879.json index be4a116326e..e84628ce90c 100644 --- a/2021/39xxx/CVE-2021-39879.json +++ b/2021/39xxx/CVE-2021-39879.json @@ -4,15 +4,86 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39879", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=7.11.0, <14.1.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing authentication for critical function in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/338825", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/338825", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39879.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39879.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing authentication in all versions of GitLab CE/EE since version 7.11.0 allows an attacker with access to a victim's session to disable two-factor authentication" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 2.2, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39880.json b/2021/39xxx/CVE-2021-39880.json index 7c4a1cd4783..050673848d9 100644 --- a/2021/39xxx/CVE-2021-39880.json +++ b/2021/39xxx/CVE-2021-39880.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39880", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=11.11, <14.2.2" + }, + { + "version_value": ">=11.10, <14.1.4" + }, + { + "version_value": ">-11.9, <14.0.9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/330561", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/330561", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1181284", + "url": "https://hackerone.com/reports/1181284", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39880.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39880.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Denial Of Service vulnerability in the apollo_upload_server Ruby gem in GitLab CE/EE version 11.11 and above allows an attacker to deny access to all users via specially crafted requests to the apollo_upload_server middleware." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks 0xn3va for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39881.json b/2021/39xxx/CVE-2021-39881.json index a603231ef9d..81f8c1c821b 100644 --- a/2021/39xxx/CVE-2021-39881.json +++ b/2021/39xxx/CVE-2021-39881.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39881", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=7.7, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient verification of data authenticity in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/26695", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/26695", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/494530", + "url": "https://hackerone.com/reports/494530", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 3.5, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @executor for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39882.json b/2021/39xxx/CVE-2021-39882.json index 0aa6a3a01dd..37603f7cbd2 100644 --- a/2021/39xxx/CVE-2021-39882.json +++ b/2021/39xxx/CVE-2021-39882.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39882", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=1.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/297473", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/297473", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39882.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39882.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE, provided a user ID, anonymous users can use a few endpoints to retrieve information about any GitLab user." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was found internally by a member of the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39883.json b/2021/39xxx/CVE-2021-39883.json index e34c16fd6c8..8467827514a 100644 --- a/2021/39xxx/CVE-2021-39883.json +++ b/2021/39xxx/CVE-2021-39883.json @@ -4,15 +4,86 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39883", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.11, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/334279", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/334279", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39883.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39883.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper authorization checks in GitLab EE > 13.11 allows subgroup members to see epics from all parent subgroups." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39884.json b/2021/39xxx/CVE-2021-39884.json index 30b490c4c1f..af01c6a9b49 100644 --- a/2021/39xxx/CVE-2021-39884.json +++ b/2021/39xxx/CVE-2021-39884.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39884", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.13, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/25414", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/25414", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/447817", + "url": "https://hackerone.com/reports/447817", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39884.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39884.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab EE since version 8.13, an endpoint discloses names of private groups that have access to a project to low privileged users that are part of that project." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39885.json b/2021/39xxx/CVE-2021-39885.json index bce6357f4fc..ea6780cc1d9 100644 --- a/2021/39xxx/CVE-2021-39885.json +++ b/2021/39xxx/CVE-2021-39885.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39885", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.7, <14.3.1" + }, + { + "version_value": ">=13.6, <14.2.5" + }, + { + "version_value": ">=13.5, <14.1.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/341140", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/341140", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1342009", + "url": "https://hackerone.com/reports/1342009", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39885.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39885.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Stored XSS in merge request creation page in Gitlab EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious approval rule names" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39886.json b/2021/39xxx/CVE-2021-39886.json index 7f99eecb2ce..c294e83c7b3 100644 --- a/2021/39xxx/CVE-2021-39886.json +++ b/2021/39xxx/CVE-2021-39886.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39886", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=10.6, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/330520", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/330520", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39886.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39886.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Permissions rules were not applied while issues were moved between projects of the same group in GitLab versions starting with 10.6 and up to 14.1.7 allowing users to read confidential Epic references." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 2.6, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was discovered internally by the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39887.json b/2021/39xxx/CVE-2021-39887.json index 5865f95393f..bba198be322 100644 --- a/2021/39xxx/CVE-2021-39887.json +++ b/2021/39xxx/CVE-2021-39887.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39887", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.4, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/332903", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/332903", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1218174", + "url": "https://hackerone.com/reports/1218174", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39887.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39887.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown in GitLab CE/EE version 8.4 and above allowed an attacker to execute arbitrary JavaScript code on the victim's behalf." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 7.2, + "baseSeverity": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks saleemrashid for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39888.json b/2021/39xxx/CVE-2021-39888.json index 3098467a952..bb707e2175f 100644 --- a/2021/39xxx/CVE-2021-39888.json +++ b/2021/39xxx/CVE-2021-39888.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39888", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.10, <14.3.1" + }, + { + "version_value": ">=13.9, <14.2.5" + }, + { + "version_value": ">=13.8, <14.1.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/336446", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/336446", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1255128", + "url": "https://hackerone.com/reports/1255128", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39888.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39888.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab EE since version 13.10, a specific API endpoint may reveal details about a private group and other sensitive info inside issue and merge request templates." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @0xn3va for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39889.json b/2021/39xxx/CVE-2021-39889.json index 49efd22c37f..f1137cdc0e8 100644 --- a/2021/39xxx/CVE-2021-39889.json +++ b/2021/39xxx/CVE-2021-39889.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39889", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.1, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authorization bypass through user-controlled key in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/338062", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/338062", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1294017", + "url": "https://hackerone.com/reports/1294017", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39889.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39889.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39891.json b/2021/39xxx/CVE-2021-39891.json index 4b08d7e242a..fd32d517912 100644 --- a/2021/39xxx/CVE-2021-39891.json +++ b/2021/39xxx/CVE-2021-39891.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39891", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/335137", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/335137", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39891.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39891.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 8.0, access tokens created as part of admin's impersonation of a user are not cleared at the end of impersonation which may lead to unnecessary sensitive info disclosure." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was found internally by a member of the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39893.json b/2021/39xxx/CVE-2021-39893.json index f0a7ba4a20c..b306ac859c5 100644 --- a/2021/39xxx/CVE-2021-39893.json +++ b/2021/39xxx/CVE-2021-39893.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39893", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=9.1, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/340076", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/340076", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39893.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39893.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A potential DOS vulnerability was discovered in GitLab starting with version 9.1 that allowed parsing files without authorisation." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39894.json b/2021/39xxx/CVE-2021-39894.json index 39ea30ca351..21eb2da020f 100644 --- a/2021/39xxx/CVE-2021-39894.json +++ b/2021/39xxx/CVE-2021-39894.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39894", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reliance on reverse dns resolution for a security-critical action in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/214399", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/214399", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39894.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39894.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 8.0, a DNS rebinding vulnerability exists in Fogbugz importer which may be used by attackers to exploit Server Side Request Forgery attacks." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was discovered internally by the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39896.json b/2021/39xxx/CVE-2021-39896.json index 912564cad7e..83be062c15d 100644 --- a/2021/39xxx/CVE-2021-39896.json +++ b/2021/39xxx/CVE-2021-39896.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39896", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/339362", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/339362", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39896.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39896.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE since version 8.0, when an admin uses the impersonate feature twice and stops impersonating, the admin may be logged in as the second user they impersonated, which may lead to repudiation issues." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 3.7, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was reported to GitLab by a customer." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39899.json b/2021/39xxx/CVE-2021-39899.json index 88b1813059c..2d8d369cd17 100644 --- a/2021/39xxx/CVE-2021-39899.json +++ b/2021/39xxx/CVE-2021-39899.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39899", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=1.0, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper restriction of excessive authentication attempts in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/339154", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/339154", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE, an attacker with physical access to a user\u2019s machine may brute force the user\u2019s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackComplexity": "HIGH", + "attackVector": "PHYSICAL", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 2.9, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was discovered internally by the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39900.json b/2021/39xxx/CVE-2021-39900.json index 0c9cd4d5693..d0f001dd7d3 100644 --- a/2021/39xxx/CVE-2021-39900.json +++ b/2021/39xxx/CVE-2021-39900.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39900", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=10.8, <14.1.7" + }, + { + "version_value": ">=14.2, <14.2.5" + }, + { + "version_value": ">=14.3, <14.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/325088", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/325088", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39900.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39900.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Information disclosure from SendEntry in GitLab starting with 10.8 allowed exposure of full URL of artifacts stored in object-storage with a temporary availability via Rails logs." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 1.9, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3312.json b/2021/3xxx/CVE-2021-3312.json index b3f8982f369..cb23314f35d 100644 --- a/2021/3xxx/CVE-2021-3312.json +++ b/2021/3xxx/CVE-2021-3312.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3312", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3312", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/alkacon/opencms-core/releases", + "refsource": "MISC", + "name": "https://github.com/alkacon/opencms-core/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/alkacon/opencms-core/issues/725", + "url": "https://github.com/alkacon/opencms-core/issues/725" } ] } diff --git a/2021/3xxx/CVE-2021-3319.json b/2021/3xxx/CVE-2021-3319.json index ad2d583ebba..b7c6afc3767 100644 --- a/2021/3xxx/CVE-2021-3319.json +++ b/2021/3xxx/CVE-2021-3319.json @@ -4,15 +4,93 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3319", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilities@zephyrproject.org", + "DATE_PUBLIC": "2020-04-14T00:00:00.000Z", + "STATE": "PUBLIC", + "TITLE": "DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zephyrproject-rtos", + "product": { + "product_data": [ + { + "product_name": "zephyr", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "> v2.4.0" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364" } ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "environmentalScore": 6.5, + "temporalScore": 6.5, + "baseSeverity": "MEDIUM" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "NULL Pointer Dereference (CWE-476)" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Attempt to Access Child of a Non-structure Pointer (CWE-588)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364", + "refsource": "MISC", + "name": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364" + } + ] + }, + "source": { + "defect": [ + "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364" + ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3436.json b/2021/3xxx/CVE-2021-3436.json index 7b70e309fea..38b19f22331 100644 --- a/2021/3xxx/CVE-2021-3436.json +++ b/2021/3xxx/CVE-2021-3436.json @@ -4,15 +4,93 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3436", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilities@zephyrproject.org", + "DATE_PUBLIC": "2021-06-11T00:00:00.000Z", + "STATE": "PUBLIC", + "TITLE": "BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zephyrproject-rtos", + "product": { + "product_data": [ + { + "product_name": "zephyr", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "1.14.2" + }, + { + "version_affected": ">=", + "version_value": "2.4.0" + }, + { + "version_affected": ">=", + "version_value": "2.5.0" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63" } ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "environmentalScore": 4.3, + "temporalScore": 4.3, + "baseSeverity": "MEDIUM" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use of Multiple Resources with Duplicate Identifier (CWE-694)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63", + "refsource": "MISC", + "name": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63" + } + ] + }, + "source": { + "defect": [ + "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63" + ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3510.json b/2021/3xxx/CVE-2021-3510.json index 32596205f47..ed09ef63852 100644 --- a/2021/3xxx/CVE-2021-3510.json +++ b/2021/3xxx/CVE-2021-3510.json @@ -4,15 +4,89 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3510", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilities@zephyrproject.org", + "DATE_PUBLIC": "2020-06-20T00:00:00.000Z", + "STATE": "PUBLIC", + "TITLE": "Zephyr JSON decoder incorrectly decodes array of array" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zephyrproject-rtos", + "product": { + "product_data": [ + { + "product_name": "zephyr", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": ">1.14.0" + }, + { + "version_affected": ">=", + "version_value": ">2.5.0" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4" } ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "environmentalScore": 7.5, + "temporalScore": 7.5, + "baseSeverity": "HIGH" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Attempt to Access Child of a Non-structure Pointer (CWE-588)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4", + "refsource": "MISC", + "name": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4" + } + ] + }, + "source": { + "defect": [ + "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4" + ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3544.json b/2021/3xxx/CVE-2021-3544.json index 9f7944caa46..10c0f165ad8 100644 --- a/2021/3xxx/CVE-2021-3544.json +++ b/2021/3xxx/CVE-2021-3544.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210720-0008/", "url": "https://security.netapp.com/advisory/ntap-20210720-0008/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4980", + "url": "https://www.debian.org/security/2021/dsa-4980" } ] }, diff --git a/2021/3xxx/CVE-2021-3545.json b/2021/3xxx/CVE-2021-3545.json index bdb456a7b3d..8ec08a6e0c1 100644 --- a/2021/3xxx/CVE-2021-3545.json +++ b/2021/3xxx/CVE-2021-3545.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210720-0008/", "url": "https://security.netapp.com/advisory/ntap-20210720-0008/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4980", + "url": "https://www.debian.org/security/2021/dsa-4980" } ] }, diff --git a/2021/3xxx/CVE-2021-3546.json b/2021/3xxx/CVE-2021-3546.json index ad9946fb5b4..2c5a7f7f749 100644 --- a/2021/3xxx/CVE-2021-3546.json +++ b/2021/3xxx/CVE-2021-3546.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210720-0008/", "url": "https://security.netapp.com/advisory/ntap-20210720-0008/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4980", + "url": "https://www.debian.org/security/2021/dsa-4980" } ] }, diff --git a/2021/3xxx/CVE-2021-3561.json b/2021/3xxx/CVE-2021-3561.json index abc4426b39c..d8b9bfc1d17 100644 --- a/2021/3xxx/CVE-2021-3561.json +++ b/2021/3xxx/CVE-2021-3561.json @@ -68,6 +68,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-b71f405f40", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C44WSY5KAQXC3Y2NMSVXXZS3M5U5U2E6/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211004 [SECURITY] [DLA 2778-1] fig2dev security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3581.json b/2021/3xxx/CVE-2021-3581.json index 89a99260d87..bd5ccc27130 100644 --- a/2021/3xxx/CVE-2021-3581.json +++ b/2021/3xxx/CVE-2021-3581.json @@ -4,15 +4,85 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3581", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilities@zephyrproject.org", + "DATE_PUBLIC": "2021-09-04T00:00:00.000Z", + "STATE": "PUBLIC", + "TITLE": "Buffer Access with Incorrect Length Value in zephyr" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zephyrproject-rtos", + "product": { + "product_data": [ + { + "product_name": "zephyr", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": ">=2.5.0" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5" } ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "environmentalScore": 7.1, + "temporalScore": 7.0, + "baseSeverity": "HIGH" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Access with Incorrect Length Value (CWE-805)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5", + "refsource": "MISC", + "name": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5" + } + ] + }, + "source": { + "defect": [ + "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5" + ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3625.json b/2021/3xxx/CVE-2021-3625.json index c1145694cc3..54367916dfe 100644 --- a/2021/3xxx/CVE-2021-3625.json +++ b/2021/3xxx/CVE-2021-3625.json @@ -4,15 +4,85 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3625", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilities@zephyrproject.org", + "DATE_PUBLIC": "2021-09-21T00:00:00.000Z", + "STATE": "PUBLIC", + "TITLE": "Buffer overflow in Zephyr USB DFU DNLOAD" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zephyrproject-rtos", + "product": { + "product_data": [ + { + "product_name": "zephyr", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "v2.5.0" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363" } ] + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "environmentalScore": 9.6, + "temporalScore": 9.6, + "baseSeverity": "CRITICAL" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow (CWE-122)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363", + "refsource": "MISC", + "name": "http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363" + } + ] + }, + "source": { + "defect": [ + "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363" + ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3626.json b/2021/3xxx/CVE-2021-3626.json index eaad9bd0323..7ac2574f948 100644 --- a/2021/3xxx/CVE-2021-3626.json +++ b/2021/3xxx/CVE-2021-3626.json @@ -1,18 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@ubuntu.com", + "DATE_PUBLIC": "2021-07-01T00:00:00.000Z", "ID": "CVE-2021-3626", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Windows version of Multipass unauthenticated localhost tcp control socket can perform mounts" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multipass", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.7.0" + } + ] + } + } + ] + }, + "vendor_name": "Canonical" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Micah Lee" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Windows version of Multipass before 1.7.0 allowed any local process to connect to the localhost TCP control socket to perform mounts from the operating system to a guest, allowing for privilege escalation." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-73 External Control of File Name or Path" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://github.com/canonical/multipass/pull/2150", + "name": "https://github.com/canonical/multipass/pull/2150" + } + ] + }, + "source": { + "defect": [ + "https://github.com/canonical/multipass/pull/2150" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3634.json b/2021/3xxx/CVE-2021-3634.json index b651c97fae8..eb50456b359 100644 --- a/2021/3xxx/CVE-2021-3634.json +++ b/2021/3xxx/CVE-2021-3634.json @@ -63,6 +63,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-288925ac19", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211004-0003/", + "url": "https://security.netapp.com/advisory/ntap-20211004-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f2a020a065", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/" } ] }, diff --git a/2021/3xxx/CVE-2021-3682.json b/2021/3xxx/CVE-2021-3682.json index 4d3a03e7763..d0936d68ae8 100644 --- a/2021/3xxx/CVE-2021-3682.json +++ b/2021/3xxx/CVE-2021-3682.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4980", + "url": "https://www.debian.org/security/2021/dsa-4980" } ] }, diff --git a/2021/3xxx/CVE-2021-3709.json b/2021/3xxx/CVE-2021-3709.json index 107a862c109..c0b782783af 100644 --- a/2021/3xxx/CVE-2021-3709.json +++ b/2021/3xxx/CVE-2021-3709.json @@ -1,18 +1,133 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@ubuntu.com", + "DATE_PUBLIC": "2021-09-14T00:00:00.000Z", "ID": "CVE-2021-3709", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Apport file permission bypass through emacs byte compilation errors" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "apport", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.14.1", + "version_value": "2.14.1-0ubuntu3.29+esm8" + }, + { + "version_affected": "<", + "version_name": "2.20.1", + "version_value": "2.20.1-0ubuntu2.30+esm2" + }, + { + "version_affected": "<", + "version_name": "2.20.9", + "version_value": "2.20.9-0ubuntu7.26" + }, + { + "version_affected": "<", + "version_name": "2.20.11", + "version_value": "2.20.11-0ubuntu27.20" + }, + { + "version_affected": "<", + "version_name": "2.20.11", + "version_value": "2.20.11-0ubuntu65.3" + } + ] + } + } + ] + }, + "vendor_name": "Canonical" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Maik M\u00fcnch (maik@secfault-security.com)(@fktio)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-538 File and Directory Information Exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3709", + "name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3709" + }, + { + "refsource": "MISC", + "url": "https://ubuntu.com/security/notices/USN-5077-1", + "name": "https://ubuntu.com/security/notices/USN-5077-1" + }, + { + "refsource": "MISC", + "url": "https://ubuntu.com/security/notices/USN-5077-2", + "name": "https://ubuntu.com/security/notices/USN-5077-2" + }, + { + "refsource": "MISC", + "url": "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308", + "name": "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308" + } + ] + }, + "source": { + "advisory": "https://ubuntu.com/security/notices/USN-5077-1", + "defect": [ + "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3710.json b/2021/3xxx/CVE-2021-3710.json index c0186c3aa8a..84fa813b763 100644 --- a/2021/3xxx/CVE-2021-3710.json +++ b/2021/3xxx/CVE-2021-3710.json @@ -1,18 +1,137 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@ubuntu.com", + "DATE_PUBLIC": "2021-09-14T00:00:00.000Z", "ID": "CVE-2021-3710", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Apport info disclosure via path traversal bug in read_file" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "apport", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.14.1", + "version_value": "2.14.1-0ubuntu3.29+esm8" + }, + { + "version_affected": "<", + "version_name": "2.20.1", + "version_value": "2.20.1-0ubuntu2.30+esm2" + }, + { + "version_affected": "<", + "version_name": "2.20.9", + "version_value": "2.20.9-0ubuntu7.26" + }, + { + "version_affected": "<", + "version_name": "2.20.11", + "version_value": "2.20.11-0ubuntu27.20" + }, + { + "version_affected": "<", + "version_name": "2.20.11", + "version_value": "2.20.11-0ubuntu65.3" + } + ] + } + } + ] + }, + "vendor_name": "Canonical" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Stephen R\u00f6ttger (@_tsuro)" + }, + { + "lang": "eng", + "value": "Maik M\u00fcnch (maik@secfault-security.com)(@fktio)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-24 Path Traversal: '../filedir'" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://ubuntu.com/security/notices/USN-5077-1", + "name": "https://ubuntu.com/security/notices/USN-5077-1" + }, + { + "refsource": "MISC", + "url": "https://ubuntu.com/security/notices/USN-5077-2", + "name": "https://ubuntu.com/security/notices/USN-5077-2" + }, + { + "refsource": "MISC", + "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710", + "name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710" + }, + { + "refsource": "MISC", + "url": "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832", + "name": "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832" + } + ] + }, + "source": { + "advisory": "https://ubuntu.com/security/notices/USN-5077-1", + "defect": [ + "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3712.json b/2021/3xxx/CVE-2021-3712.json index 9110ffd0307..f00b69beed3 100644 --- a/2021/3xxx/CVE-2021-3712.json +++ b/2021/3xxx/CVE-2021-3712.json @@ -119,6 +119,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" } ] } diff --git a/2021/3xxx/CVE-2021-3713.json b/2021/3xxx/CVE-2021-3713.json index f27a32e58fb..1058aec28eb 100644 --- a/2021/3xxx/CVE-2021-3713.json +++ b/2021/3xxx/CVE-2021-3713.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210923-0006/", "url": "https://security.netapp.com/advisory/ntap-20210923-0006/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4980", + "url": "https://www.debian.org/security/2021/dsa-4980" } ] }, diff --git a/2021/3xxx/CVE-2021-3747.json b/2021/3xxx/CVE-2021-3747.json index 831838a544e..6d3643191e6 100644 --- a/2021/3xxx/CVE-2021-3747.json +++ b/2021/3xxx/CVE-2021-3747.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@ubuntu.com", + "DATE_PUBLIC": "2021-09-28T00:00:00.000Z", "ID": "CVE-2021-3747", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "MacOS version of Multipass incorrect owner for application directory" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multipass", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.7", + "version_value": "1.7.2" + } + ] + } + } + ] + }, + "vendor_name": "Canonical" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Matthew Conway" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-732 Incorrect Permission Assignment for Critical Resource" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://github.com/canonical/multipass/issues/2261", + "name": "https://github.com/canonical/multipass/issues/2261" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3770.json b/2021/3xxx/CVE-2021-3770.json index 33596527e85..e4eed9cbc12 100644 --- a/2021/3xxx/CVE-2021-3770.json +++ b/2021/3xxx/CVE-2021-3770.json @@ -94,6 +94,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-e982f972f2", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210930 3 new CVE's in vim", + "url": "http://www.openwall.com/lists/oss-security/2021/10/01/1" } ] }, diff --git a/2021/3xxx/CVE-2021-3778.json b/2021/3xxx/CVE-2021-3778.json index 1ef1df1e8d1..114106e8090 100644 --- a/2021/3xxx/CVE-2021-3778.json +++ b/2021/3xxx/CVE-2021-3778.json @@ -79,6 +79,11 @@ "name": "https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f", "refsource": "MISC", "url": "https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210930 3 new CVE's in vim", + "url": "http://www.openwall.com/lists/oss-security/2021/10/01/1" } ] }, @@ -86,4 +91,4 @@ "advisory": "d9c17308-2c99-4f9f-a706-f7f72c24c273", "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3796.json b/2021/3xxx/CVE-2021-3796.json index cae4d50437f..6a9c3aec659 100644 --- a/2021/3xxx/CVE-2021-3796.json +++ b/2021/3xxx/CVE-2021-3796.json @@ -79,6 +79,11 @@ "name": "https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3", "refsource": "MISC", "url": "https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210930 3 new CVE's in vim", + "url": "http://www.openwall.com/lists/oss-security/2021/10/01/1" } ] }, @@ -86,4 +91,4 @@ "advisory": "ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d", "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3825.json b/2021/3xxx/CVE-2021-3825.json index 4232170e541..cc145588c57 100644 --- a/2021/3xxx/CVE-2021-3825.json +++ b/2021/3xxx/CVE-2021-3825.json @@ -1,18 +1,119 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-3825", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "CVE_data_meta": { + "ID": "CVE-2021-3825", + "ASSIGNER": "cve@usom.gov.tr", + "DATE_PUBLIC": "2021-09-17T00:00:00.000Z", + "TITLE": "Missing Authorization Checks in LiderAhenk", + "AKA": "", + "STATE": "PUBLIC" + }, + "source": { + "defect": [ + "TR-21-0795" + ], + "advisory": "TR-21-0795", + "discovery": "EXTERNAL" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "TUBITAK", + "product": { + "product_data": [ + { + "product_name": "Lider", + "version": { + "version_data": [ + { + "version_name": "", + "version_affected": "<", + "version_value": "2.1.16", + "platform": "" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306 Missing Authentication for Critical Function" + } + ] + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.usom.gov.tr/bildirim/tr-21-0795", + "name": "https://www.usom.gov.tr/bildirim/tr-21-0795" + }, + { + "refsource": "CONFIRM", + "url": "https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/", + "name": "https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/" + } + ] + }, + "configuration": [], + "impact": { + "cvss": { + "version": "3.1", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + } + }, + "exploit": [ + { + "lang": "eng", + "value": "https://github.com/mdisec/pardus-liderahenk-0day-RCE" + } + ], + "work_around": [], + "solution": [ + { + "lang": "eng", + "value": "Lider component should be updated to 2.1.16." + } + ], + "credit": [ + { + "lang": "eng", + "value": "Mehmet INCE from PRODAFT" + } + ] +} diff --git a/2021/3xxx/CVE-2021-3832.json b/2021/3xxx/CVE-2021-3832.json index cf1f7082795..67a1373c830 100644 --- a/2021/3xxx/CVE-2021-3832.json +++ b/2021/3xxx/CVE-2021-3832.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-coordination@incibe.es", + "DATE_PUBLIC": "2021-10-06T07:00:00.000Z", "ID": "CVE-2021-3832", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integria IMS Remote Code Execution" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Integria IMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "5.0.92", + "version_value": "5.0.92" + } + ] + } + } + ] + }, + "vendor_name": "\u00c1rtica" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Discovered by @nag0mez (special mention to @_Barriuso)." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Integria IMS in its 5.0.92 version is vulnerable to a Remote Code Execution attack through file uploading. An unauthenticated attacker could abuse the AsyncUpload() function in order to exploit the vulnerability." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-remote-code-execution", + "refsource": "CONFIRM", + "url": "https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-remote-code-execution" + }, + { + "name": "https://integriaims.com/en/services/updates/", + "refsource": "CONFIRM", + "url": "https://integriaims.com/en/services/updates/" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "This vulnerability has been solved in Integria IMS 5.0 93" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3833.json b/2021/3xxx/CVE-2021-3833.json index 810b4dd1c4d..3c52f301f7c 100644 --- a/2021/3xxx/CVE-2021-3833.json +++ b/2021/3xxx/CVE-2021-3833.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-coordination@incibe.es", + "DATE_PUBLIC": "2021-10-06T07:00:00.000Z", "ID": "CVE-2021-3833", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integria IMS incorrect authorization" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Integria IMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "5.0.92", + "version_value": "5.0.92" + } + ] + } + } + ] + }, + "vendor_name": "\u00c1rtica" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Discovered by @nag0mez (special mention to @_Barriuso)." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Integria IMS login check uses a loose comparator (\"==\") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://integriaims.com/en/services/updates/", + "refsource": "CONFIRM", + "url": "https://integriaims.com/en/services/updates/" + }, + { + "name": "https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-incorrect-authorization", + "refsource": "CONFIRM", + "url": "https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-incorrect-authorization" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "This vulnerability has been solved in Integria IMS 5.0 93" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3834.json b/2021/3xxx/CVE-2021-3834.json index bbec5848c72..a6178553cea 100644 --- a/2021/3xxx/CVE-2021-3834.json +++ b/2021/3xxx/CVE-2021-3834.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-coordination@incibe.es", + "DATE_PUBLIC": "2021-10-06T07:00:00.000Z", "ID": "CVE-2021-3834", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integria IMS vulnerable to Cross Site Scripting (XSS)" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Integria IMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "5.0.92", + "version_value": "5.0.92" + } + ] + } + } + ] + }, + "vendor_name": "\u00c1rtica" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Discovered by @_Barriuso (special mention to @nag0mez )." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Integria IMS in its 5.0.92 version does not filter correctly some fields related to the login.php file. An attacker could exploit this vulnerability in order to perform a cross-site scripting attack (XSS)." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://integriaims.com/en/services/updates/", + "refsource": "CONFIRM", + "url": "https://integriaims.com/en/services/updates/" + }, + { + "name": "https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-vulnerable-cross-site-scripting-xss", + "refsource": "CONFIRM", + "url": "https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-vulnerable-cross-site-scripting-xss" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "This vulnerability has been solved in Integria IMS 5.0 93" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3841.json b/2021/3xxx/CVE-2021-3841.json new file mode 100644 index 00000000000..0ade9f6903d --- /dev/null +++ b/2021/3xxx/CVE-2021-3841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3842.json b/2021/3xxx/CVE-2021-3842.json new file mode 100644 index 00000000000..e246db1f9f6 --- /dev/null +++ b/2021/3xxx/CVE-2021-3842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3843.json b/2021/3xxx/CVE-2021-3843.json new file mode 100644 index 00000000000..99e6be88494 --- /dev/null +++ b/2021/3xxx/CVE-2021-3843.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3843", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3844.json b/2021/3xxx/CVE-2021-3844.json new file mode 100644 index 00000000000..c8d364c9c46 --- /dev/null +++ b/2021/3xxx/CVE-2021-3844.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3844", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3845.json b/2021/3xxx/CVE-2021-3845.json new file mode 100644 index 00000000000..b09085e5a0f --- /dev/null +++ b/2021/3xxx/CVE-2021-3845.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3845", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3846.json b/2021/3xxx/CVE-2021-3846.json new file mode 100644 index 00000000000..283c6135203 --- /dev/null +++ b/2021/3xxx/CVE-2021-3846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3847.json b/2021/3xxx/CVE-2021-3847.json new file mode 100644 index 00000000000..1d22a2e939e --- /dev/null +++ b/2021/3xxx/CVE-2021-3847.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3847", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3848.json b/2021/3xxx/CVE-2021-3848.json new file mode 100644 index 00000000000..dc68093aa9b --- /dev/null +++ b/2021/3xxx/CVE-2021-3848.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2021-3848", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro Apex One", + "version": { + "version_data": [ + { + "version_value": "2019, SaaS" + } + ] + } + }, + { + "product_name": "Trend Micro Worry-Free Business Security", + "version": { + "version_data": [ + { + "version_value": "10.0 SP1, Services (SaaS)" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An arbitrary file creation by privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1, and Worry-Free Business Security Services could allow a local attacker to create an arbitrary file with higher privileges that could lead to a denial-of-service (DoS) on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary File Creation by Privliege Escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000289183", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000289183" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3849.json b/2021/3xxx/CVE-2021-3849.json new file mode 100644 index 00000000000..22e5c078087 --- /dev/null +++ b/2021/3xxx/CVE-2021-3849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3850.json b/2021/3xxx/CVE-2021-3850.json new file mode 100644 index 00000000000..71977baebe5 --- /dev/null +++ b/2021/3xxx/CVE-2021-3850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3851.json b/2021/3xxx/CVE-2021-3851.json new file mode 100644 index 00000000000..51dc9c0ee97 --- /dev/null +++ b/2021/3xxx/CVE-2021-3851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3852.json b/2021/3xxx/CVE-2021-3852.json new file mode 100644 index 00000000000..29fcc56187a --- /dev/null +++ b/2021/3xxx/CVE-2021-3852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3853.json b/2021/3xxx/CVE-2021-3853.json new file mode 100644 index 00000000000..87185a1e969 --- /dev/null +++ b/2021/3xxx/CVE-2021-3853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3854.json b/2021/3xxx/CVE-2021-3854.json new file mode 100644 index 00000000000..eb6d3b03485 --- /dev/null +++ b/2021/3xxx/CVE-2021-3854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3855.json b/2021/3xxx/CVE-2021-3855.json new file mode 100644 index 00000000000..aa33a9aa27d --- /dev/null +++ b/2021/3xxx/CVE-2021-3855.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3855", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3856.json b/2021/3xxx/CVE-2021-3856.json new file mode 100644 index 00000000000..ec8913ec155 --- /dev/null +++ b/2021/3xxx/CVE-2021-3856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3857.json b/2021/3xxx/CVE-2021-3857.json new file mode 100644 index 00000000000..e536b14214b --- /dev/null +++ b/2021/3xxx/CVE-2021-3857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3858.json b/2021/3xxx/CVE-2021-3858.json new file mode 100644 index 00000000000..b9f210c06ea --- /dev/null +++ b/2021/3xxx/CVE-2021-3858.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3858", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3859.json b/2021/3xxx/CVE-2021-3859.json new file mode 100644 index 00000000000..8e289655548 --- /dev/null +++ b/2021/3xxx/CVE-2021-3859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3860.json b/2021/3xxx/CVE-2021-3860.json new file mode 100644 index 00000000000..3a4d28c6a32 --- /dev/null +++ b/2021/3xxx/CVE-2021-3860.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3860", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3861.json b/2021/3xxx/CVE-2021-3861.json new file mode 100644 index 00000000000..89a8f0e5248 --- /dev/null +++ b/2021/3xxx/CVE-2021-3861.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3861", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3862.json b/2021/3xxx/CVE-2021-3862.json new file mode 100644 index 00000000000..5c3d95d848f --- /dev/null +++ b/2021/3xxx/CVE-2021-3862.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3862", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3863.json b/2021/3xxx/CVE-2021-3863.json new file mode 100644 index 00000000000..2fb9c8c530b --- /dev/null +++ b/2021/3xxx/CVE-2021-3863.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3863", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3864.json b/2021/3xxx/CVE-2021-3864.json new file mode 100644 index 00000000000..fd6cdee3abc --- /dev/null +++ b/2021/3xxx/CVE-2021-3864.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3864", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3865.json b/2021/3xxx/CVE-2021-3865.json new file mode 100644 index 00000000000..050a1ab3fd3 --- /dev/null +++ b/2021/3xxx/CVE-2021-3865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3866.json b/2021/3xxx/CVE-2021-3866.json new file mode 100644 index 00000000000..430b7f1bc53 --- /dev/null +++ b/2021/3xxx/CVE-2021-3866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3867.json b/2021/3xxx/CVE-2021-3867.json new file mode 100644 index 00000000000..d5ea3f74836 --- /dev/null +++ b/2021/3xxx/CVE-2021-3867.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3867", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3868.json b/2021/3xxx/CVE-2021-3868.json new file mode 100644 index 00000000000..c5db770f9e1 --- /dev/null +++ b/2021/3xxx/CVE-2021-3868.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3868", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3869.json b/2021/3xxx/CVE-2021-3869.json new file mode 100644 index 00000000000..05f05cc1d7c --- /dev/null +++ b/2021/3xxx/CVE-2021-3869.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3869", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3870.json b/2021/3xxx/CVE-2021-3870.json new file mode 100644 index 00000000000..c99e1ac06cc --- /dev/null +++ b/2021/3xxx/CVE-2021-3870.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3870", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3871.json b/2021/3xxx/CVE-2021-3871.json new file mode 100644 index 00000000000..a6d3dd43eff --- /dev/null +++ b/2021/3xxx/CVE-2021-3871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40323.json b/2021/40xxx/CVE-2021-40323.json index f16f7fd8711..bd76f5434c7 100644 --- a/2021/40xxx/CVE-2021-40323.json +++ b/2021/40xxx/CVE-2021-40323.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40323", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40323", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a", + "url": "https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a" + }, + { + "refsource": "MISC", + "name": "https://github.com/cobbler/cobbler/releases/tag/v3.3.0", + "url": "https://github.com/cobbler/cobbler/releases/tag/v3.3.0" } ] } diff --git a/2021/40xxx/CVE-2021-40324.json b/2021/40xxx/CVE-2021-40324.json index c0061e67d92..89f568057ef 100644 --- a/2021/40xxx/CVE-2021-40324.json +++ b/2021/40xxx/CVE-2021-40324.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40324", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40324", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a", + "url": "https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a" + }, + { + "refsource": "MISC", + "name": "https://github.com/cobbler/cobbler/releases/tag/v3.3.0", + "url": "https://github.com/cobbler/cobbler/releases/tag/v3.3.0" } ] } diff --git a/2021/40xxx/CVE-2021-40325.json b/2021/40xxx/CVE-2021-40325.json index 0f157e83b18..c960c517e86 100644 --- a/2021/40xxx/CVE-2021-40325.json +++ b/2021/40xxx/CVE-2021-40325.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40325", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40325", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cobbler before 3.3.0 allows authorization bypass for modification of settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a", + "url": "https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a" + }, + { + "refsource": "MISC", + "name": "https://github.com/cobbler/cobbler/releases/tag/v3.3.0", + "url": "https://github.com/cobbler/cobbler/releases/tag/v3.3.0" } ] } diff --git a/2021/40xxx/CVE-2021-40329.json b/2021/40xxx/CVE-2021-40329.json index 921959ed702..2fae756ef3e 100644 --- a/2021/40xxx/CVE-2021-40329.json +++ b/2021/40xxx/CVE-2021-40329.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "responsible-disclosure@pingidentity.com", "ID": "CVE-2021-40329", "STATE": "PUBLIC" }, @@ -11,18 +11,58 @@ "product": { "product_data": [ { - "product_name": "n/a", + "product_name": "PingFederate", "version": { "version_data": [ { - "version_value": "n/a" + "version_value": "9.2.3" + } + ] + } + }, + { + "product_name": "PingFederate", + "version": { + "version_data": [ + { + "version_value": "9.3.3" + } + ] + } + }, + { + "product_name": "PingFederate", + "version": { + "version_data": [ + { + "version_value": "10.0.9" + } + ] + } + }, + { + "product_name": "PingFederate", + "version": { + "version_data": [ + { + "version_value": "10.1.6" + } + ] + } + }, + { + "product_name": "PingFederate", + "version": { + "version_data": [ + { + "version_value": "10.2.3" } ] } } ] }, - "vendor_name": "n/a" + "vendor_name": "Ping Identity" } ] } @@ -44,7 +84,7 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "Incorrect Access Control" } ] } diff --git a/2021/40xxx/CVE-2021-40438.json b/2021/40xxx/CVE-2021-40438.json index 65a18fe952d..185c6f59dcb 100644 --- a/2021/40xxx/CVE-2021-40438.json +++ b/2021/40xxx/CVE-2021-40438.json @@ -103,6 +103,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-e3f6dd670d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0004/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0004/" } ] }, diff --git a/2021/40xxx/CVE-2021-40439.json b/2021/40xxx/CVE-2021-40439.json index 27036bf13c5..321134cd2ed 100644 --- a/2021/40xxx/CVE-2021-40439.json +++ b/2021/40xxx/CVE-2021-40439.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-40439", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Billion Laughs" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache OpenOffice", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "Apache OpenOffice", + "version_value": "4.1.10" + }, + { + "version_affected": "<=", + "version_name": "OpenOffice.org", + "version_value": "3.4" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Apache OpenOffice has a dependency on expat software. Versions prior to 2.1.0 were subject to CVE-2013-0340 a \"Billion Laughs\" entity expansion denial of service attack and exploit via crafted XML files. ODF files consist of a set of XML files. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. expat in version 4.1.11 is patched." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": [ + { + "other": "medium" + } + ], + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611 Improper Restriction of XML External Entity Reference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E", + "name": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", + "url": "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", + "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/4" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40490.json b/2021/40xxx/CVE-2021-40490.json index d21525e8289..4e6131a25f7 100644 --- a/2021/40xxx/CVE-2021-40490.json +++ b/2021/40xxx/CVE-2021-40490.json @@ -71,6 +71,11 @@ "refsource": "DEBIAN", "name": "DSA-4978", "url": "https://www.debian.org/security/2021/dsa-4978" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211004-0001/", + "url": "https://security.netapp.com/advisory/ntap-20211004-0001/" } ] } diff --git a/2021/40xxx/CVE-2021-40516.json b/2021/40xxx/CVE-2021-40516.json index 54e014411d5..a9250fc511e 100644 --- a/2021/40xxx/CVE-2021-40516.json +++ b/2021/40xxx/CVE-2021-40516.json @@ -61,6 +61,11 @@ "url": "https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b", "refsource": "MISC", "name": "https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html" } ] } diff --git a/2021/40xxx/CVE-2021-40530.json b/2021/40xxx/CVE-2021-40530.json index e52beb147fe..11b0b457013 100644 --- a/2021/40xxx/CVE-2021-40530.json +++ b/2021/40xxx/CVE-2021-40530.json @@ -66,6 +66,21 @@ "url": "https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2", "refsource": "MISC", "name": "https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-8b14da0538", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGVBZ2TTRKCTYAZTRHTF6OBD4W37F5MT/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-a381a721a9", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57OJA2K5AHX5HAU2QBDRWLGIIUX7GASC/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-6788250ea4", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJYOZGWI7TD27SEXILSM6VUTPPEICDL7/" } ] } diff --git a/2021/40xxx/CVE-2021-40683.json b/2021/40xxx/CVE-2021-40683.json index d0c8cc64ccb..be42838fa75 100644 --- a/2021/40xxx/CVE-2021-40683.json +++ b/2021/40xxx/CVE-2021-40683.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40683", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40683", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Akamai EAA (Enterprise Application Access) Client before 2.3.1, 2.4.x before 2.4.1, and 2.5.x before 2.5.3, an unquoted path may allow an attacker to hijack the flow of execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.akamai.com/products/enterprise-application-access", + "refsource": "MISC", + "name": "https://www.akamai.com/products/enterprise-application-access" + }, + { + "refsource": "CONFIRM", + "name": "https://akamai.com/blog/news/eaa-client-escalation-of-privilege-vulnerability", + "url": "https://akamai.com/blog/news/eaa-client-escalation-of-privilege-vulnerability" } ] } diff --git a/2021/40xxx/CVE-2021-40711.json b/2021/40xxx/CVE-2021-40711.json index e3c05b5e572..9073d9eceba 100644 --- a/2021/40xxx/CVE-2021-40711.json +++ b/2021/40xxx/CVE-2021-40711.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a stored XSS vulnerability when creating Content Fragments. An authenticated attacker can send a malformed POST request to achieve server-side denial of service. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + "value": "Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a stored XSS vulnerability when creating Content Fragments. An authenticated attacker can send a malformed POST request to achieve arbitrary code execution. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." } ] }, @@ -58,14 +58,14 @@ "attackComplexity": "Low", "attackVector": "Network", "availabilityImpact": "None", - "baseScore": 7.5, - "baseSeverity": "High", - "confidentialityImpact": "None", - "integrityImpact": "High", - "privilegesRequired": "None", + "baseScore": 6.3, + "baseSeverity": "Medium", + "confidentialityImpact": "High", + "integrityImpact": "Low", + "privilegesRequired": "Low", "scope": "Unchanged", - "userInteraction": "None", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } }, diff --git a/2021/40xxx/CVE-2021-40725.json b/2021/40xxx/CVE-2021-40725.json index 2a63e294901..ff122a5b31e 100644 --- a/2021/40xxx/CVE-2021-40725.json +++ b/2021/40xxx/CVE-2021-40725.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-09-14T23:00:00.000Z", "ID": "CVE-2021-40725", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Acrobat Reader DC AcroForm listbox Use-After-Free Remote Code Execution Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acrobat Reader", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "2020.004.30006" + }, + { + "version_affected": "<=", + "version_value": "2017.011.30199" + }, + { + "version_affected": "<=", + "version_value": "2021.005.20060" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForm listbox that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free (CWE-416)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-55.html", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb21-55.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40726.json b/2021/40xxx/CVE-2021-40726.json index 8d3d77fdeb9..bd10c46e44f 100644 --- a/2021/40xxx/CVE-2021-40726.json +++ b/2021/40xxx/CVE-2021-40726.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-09-14T23:00:00.000Z", "ID": "CVE-2021-40726", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Acrobat Reader DC AcroForm Field Use-After-Free Remote Code Execution Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acrobat Reader", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "2020.004.30006" + }, + { + "version_affected": "<=", + "version_value": "2017.011.30199" + }, + { + "version_affected": "<=", + "version_value": "2021.005.20060" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForm field that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free (CWE-416)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-55.html", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb21-55.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40832.json b/2021/40xxx/CVE-2021-40832.json index efbff07a17b..ba10c9c4902 100644 --- a/2021/40xxx/CVE-2021-40832.json +++ b/2021/40xxx/CVE-2021-40832.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40832", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Denial-of-Service (DoS) Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant F-Secure Cloud Protection for Salesforce and Cloud Protection for Microsoft Office 365", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All Version " + } + ] + } + } + ] + }, + "vendor_name": "F-Secure" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVRDL unpacking module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service Vulnerability " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", + "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" + }, + { + "refsource": "MISC", + "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832", + "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-09-29_03" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40839.json b/2021/40xxx/CVE-2021-40839.json index 83d02ce04f8..fd18513470c 100644 --- a/2021/40xxx/CVE-2021-40839.json +++ b/2021/40xxx/CVE-2021-40839.json @@ -71,6 +71,11 @@ "url": "https://pypi.org/project/rencode/#history", "refsource": "MISC", "name": "https://pypi.org/project/rencode/#history" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0001/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0001/" } ] } diff --git a/2021/40xxx/CVE-2021-40921.json b/2021/40xxx/CVE-2021-40921.json index d1805bf10b2..91342ceb306 100644 --- a/2021/40xxx/CVE-2021-40921.json +++ b/2021/40xxx/CVE-2021-40921.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40921", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40921", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in _contactform.inc.php in Detector 0.8.5 and below version allows remote attackers to inject arbitrary web script or HTML via the cid parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/dmolsen/Detector/issues/35", + "refsource": "MISC", + "name": "https://github.com/dmolsen/Detector/issues/35" } ] } diff --git a/2021/40xxx/CVE-2021-40922.json b/2021/40xxx/CVE-2021-40922.json index fe6f76b1117..e76db50409f 100644 --- a/2021/40xxx/CVE-2021-40922.json +++ b/2021/40xxx/CVE-2021-40922.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40922", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40922", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the last_name parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pixeline/bugs/issues/552", + "refsource": "MISC", + "name": "https://github.com/pixeline/bugs/issues/552" + }, + { + "url": "https://github.com/pixeline/bugs", + "refsource": "MISC", + "name": "https://github.com/pixeline/bugs" } ] } diff --git a/2021/40xxx/CVE-2021-40923.json b/2021/40xxx/CVE-2021-40923.json index b9f0bf4dba8..2ba74cac2a2 100644 --- a/2021/40xxx/CVE-2021-40923.json +++ b/2021/40xxx/CVE-2021-40923.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40923", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40923", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the email parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pixeline/bugs/issues/552", + "refsource": "MISC", + "name": "https://github.com/pixeline/bugs/issues/552" + }, + { + "url": "https://github.com/pixeline/bugs", + "refsource": "MISC", + "name": "https://github.com/pixeline/bugs" } ] } diff --git a/2021/40xxx/CVE-2021-40924.json b/2021/40xxx/CVE-2021-40924.json index c3b45d43790..d67dc2a9159 100644 --- a/2021/40xxx/CVE-2021-40924.json +++ b/2021/40xxx/CVE-2021-40924.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40924", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40924", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the first_name parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pixeline/bugs/issues/552", + "refsource": "MISC", + "name": "https://github.com/pixeline/bugs/issues/552" + }, + { + "url": "https://github.com/pixeline/bugs", + "refsource": "MISC", + "name": "https://github.com/pixeline/bugs" } ] } diff --git a/2021/40xxx/CVE-2021-40925.json b/2021/40xxx/CVE-2021-40925.json index bf139fb64d4..2c658bbe8e6 100644 --- a/2021/40xxx/CVE-2021-40925.json +++ b/2021/40xxx/CVE-2021-40925.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40925", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40925", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in dompdf/dompdf/www/demo.php infaveo-helpdesk v1.11.0 and below allow remote attackers to inject arbitrary web script or HTML via the $_SERVER[\"PHP_SELF\"] parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ladybirdweb/faveo-helpdesk/issues/5423", + "refsource": "MISC", + "name": "https://github.com/ladybirdweb/faveo-helpdesk/issues/5423" + }, + { + "url": "https://github.com/ladybirdweb/faveo-helpdesk", + "refsource": "MISC", + "name": "https://github.com/ladybirdweb/faveo-helpdesk" } ] } diff --git a/2021/40xxx/CVE-2021-40926.json b/2021/40xxx/CVE-2021-40926.json index f177447918b..8cbf0706c5b 100644 --- a/2021/40xxx/CVE-2021-40926.json +++ b/2021/40xxx/CVE-2021-40926.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40926", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40926", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/JamesHeinrich/getID3/issues/341", + "refsource": "MISC", + "name": "https://github.com/JamesHeinrich/getID3/issues/341" + }, + { + "url": "https://github.com/JamesHeinrich/getID3", + "refsource": "MISC", + "name": "https://github.com/JamesHeinrich/getID3" } ] } diff --git a/2021/40xxx/CVE-2021-40927.json b/2021/40xxx/CVE-2021-40927.json index d7ad0331735..0e04374cb71 100644 --- a/2021/40xxx/CVE-2021-40927.json +++ b/2021/40xxx/CVE-2021-40927.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40927", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40927", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in callback.php in Spotify-for-Alfred 0.13.9 and below allows remote attackers to inject arbitrary web script or HTML via the error parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/citelao/Spotify-for-Alfred/issues/137", + "refsource": "MISC", + "name": "https://github.com/citelao/Spotify-for-Alfred/issues/137" + }, + { + "url": "https://github.com/citelao/Spotify-for-Alfred", + "refsource": "MISC", + "name": "https://github.com/citelao/Spotify-for-Alfred" } ] } diff --git a/2021/40xxx/CVE-2021-40928.json b/2021/40xxx/CVE-2021-40928.json index bb344044dac..ca89a78e13e 100644 --- a/2021/40xxx/CVE-2021-40928.json +++ b/2021/40xxx/CVE-2021-40928.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40928", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40928", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in index.php in FlexTV beta development version allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/d8ahazard/FlexTV/issues/37", + "refsource": "MISC", + "name": "https://github.com/d8ahazard/FlexTV/issues/37" + }, + { + "url": "https://github.com/d8ahazard/FlexTV", + "refsource": "MISC", + "name": "https://github.com/d8ahazard/FlexTV" } ] } diff --git a/2021/40xxx/CVE-2021-40960.json b/2021/40xxx/CVE-2021-40960.json index 5a9fa5ea478..f0bbaf27370 100644 --- a/2021/40xxx/CVE-2021-40960.json +++ b/2021/40xxx/CVE-2021-40960.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40960", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40960", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.galera.com.tr/", + "refsource": "MISC", + "name": "http://www.galera.com.tr/" + }, + { + "refsource": "MISC", + "name": "http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/", + "url": "http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/" } ] } diff --git a/2021/40xxx/CVE-2021-40968.json b/2021/40xxx/CVE-2021-40968.json index 67aefcebcef..40e9863566b 100644 --- a/2021/40xxx/CVE-2021-40968.json +++ b/2021/40xxx/CVE-2021-40968.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40968", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40968", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword2 parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spotweb/spotweb", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb" + }, + { + "url": "https://github.com/spotweb/spotweb/issues/711", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb/issues/711" } ] } diff --git a/2021/40xxx/CVE-2021-40969.json b/2021/40xxx/CVE-2021-40969.json index 1f4d6858eff..287df91f207 100644 --- a/2021/40xxx/CVE-2021-40969.json +++ b/2021/40xxx/CVE-2021-40969.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40969", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40969", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the firstname parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spotweb/spotweb", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb" + }, + { + "url": "https://github.com/spotweb/spotweb/issues/711", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb/issues/711" } ] } diff --git a/2021/40xxx/CVE-2021-40970.json b/2021/40xxx/CVE-2021-40970.json index 4794107400a..550fe01777e 100644 --- a/2021/40xxx/CVE-2021-40970.json +++ b/2021/40xxx/CVE-2021-40970.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40970", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40970", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the username parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spotweb/spotweb", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb" + }, + { + "url": "https://github.com/spotweb/spotweb/issues/711", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb/issues/711" } ] } diff --git a/2021/40xxx/CVE-2021-40971.json b/2021/40xxx/CVE-2021-40971.json index 0df16a825f3..3324f912b58 100644 --- a/2021/40xxx/CVE-2021-40971.json +++ b/2021/40xxx/CVE-2021-40971.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40971", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40971", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword1 parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spotweb/spotweb", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb" + }, + { + "url": "https://github.com/spotweb/spotweb/issues/711", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb/issues/711" } ] } diff --git a/2021/40xxx/CVE-2021-40972.json b/2021/40xxx/CVE-2021-40972.json index c55f41341c2..0a808b3ded2 100644 --- a/2021/40xxx/CVE-2021-40972.json +++ b/2021/40xxx/CVE-2021-40972.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40972", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40972", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the mail parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spotweb/spotweb", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb" + }, + { + "url": "https://github.com/spotweb/spotweb/issues/711", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb/issues/711" } ] } diff --git a/2021/40xxx/CVE-2021-40973.json b/2021/40xxx/CVE-2021-40973.json index b271acc951b..576755304da 100644 --- a/2021/40xxx/CVE-2021-40973.json +++ b/2021/40xxx/CVE-2021-40973.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40973", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40973", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the lastname parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spotweb/spotweb", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb" + }, + { + "url": "https://github.com/spotweb/spotweb/issues/711", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb/issues/711" } ] } diff --git a/2021/40xxx/CVE-2021-40975.json b/2021/40xxx/CVE-2021-40975.json index 340ddf73e24..a9e0b19eb19 100644 --- a/2021/40xxx/CVE-2021-40975.json +++ b/2021/40xxx/CVE-2021-40975.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40975", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40975", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in application/modules/admin/views/ecommerce/products.php in Ecommerce-CodeIgniter-Bootstrap (Codeigniter 3.1.11, Bootstrap 3.3.7) allows remote attackers to inject arbitrary web script or HTML via the search_title parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/blob/c546a716ba56e8e33b3a5def1c18a6d89c3608f5/application/modules/admin/views/ecommerce/products.php#L37", + "refsource": "MISC", + "name": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/blob/c546a716ba56e8e33b3a5def1c18a6d89c3608f5/application/modules/admin/views/ecommerce/products.php#L37" } ] } diff --git a/2021/40xxx/CVE-2021-40978.json b/2021/40xxx/CVE-2021-40978.json index f80f357bf47..52959c901d6 100644 --- a/2021/40xxx/CVE-2021-40978.json +++ b/2021/40xxx/CVE-2021-40978.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40978", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40978", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/mkdocs/mkdocs", + "refsource": "MISC", + "name": "https://github.com/mkdocs/mkdocs" + }, + { + "refsource": "MISC", + "name": "https://github.com/nisdn/CVE-2021-40978", + "url": "https://github.com/nisdn/CVE-2021-40978" } ] } diff --git a/2021/41xxx/CVE-2021-41073.json b/2021/41xxx/CVE-2021-41073.json index 09d09a13b3b..f3a37e60429 100644 --- a/2021/41xxx/CVE-2021-41073.json +++ b/2021/41xxx/CVE-2021-41073.json @@ -71,6 +71,16 @@ "refsource": "DEBIAN", "name": "DSA-4978", "url": "https://www.debian.org/security/2021/dsa-4978" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-884d245ef8", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAP4TXEZ7J4EZQMQW5SIJMWXG7WZT3F7/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-e0d6215753", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7KSMIOQ4377CVTHMWNGNCWHMCRFRP2T/" } ] } diff --git a/2021/41xxx/CVE-2021-41079.json b/2021/41xxx/CVE-2021-41079.json index 57039e2703f..73c30413f74 100644 --- a/2021/41xxx/CVE-2021-41079.json +++ b/2021/41xxx/CVE-2021-41079.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210922 [SECURITY] [DLA 2764-1] tomcat8 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211008-0005/", + "url": "https://security.netapp.com/advisory/ntap-20211008-0005/" } ] }, diff --git a/2021/41xxx/CVE-2021-41089.json b/2021/41xxx/CVE-2021-41089.json index ad08535e182..48d25770d40 100644 --- a/2021/41xxx/CVE-2021-41089.json +++ b/2021/41xxx/CVE-2021-41089.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41089", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "`docker cp` allows unexpected chmod of host files" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "moby", + "version": { + "version_data": [ + { + "version_value": "< 20.10.9" + } + ] + } + } + ] + }, + "vendor_name": "moby" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 2.8, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281: Improper Preservation of Permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4", + "refsource": "CONFIRM", + "url": "https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4" + }, + { + "name": "https://github.com/moby/moby/commit/bce32e5c93be4caf1a592582155b9cb837fc129a", + "refsource": "MISC", + "url": "https://github.com/moby/moby/commit/bce32e5c93be4caf1a592582155b9cb837fc129a" + } + ] + }, + "source": { + "advisory": "GHSA-v994-f8vw-g7j4", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41091.json b/2021/41xxx/CVE-2021-41091.json index bfb430ffd7f..ef4e5819f1f 100644 --- a/2021/41xxx/CVE-2021-41091.json +++ b/2021/41xxx/CVE-2021-41091.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41091", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Insufficiently restricted permissions on data directory in Docker Engine" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "moby", + "version": { + "version_data": [ + { + "version_value": "< 20.10.9" + } + ] + } + } + ] + }, + "vendor_name": "moby" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host volumes to trusted containers." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281: Improper Preservation of Permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558", + "refsource": "CONFIRM", + "url": "https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558" + }, + { + "name": "https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64", + "refsource": "MISC", + "url": "https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64" + } + ] + }, + "source": { + "advisory": "GHSA-3fwx-pjgw-3558", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41092.json b/2021/41xxx/CVE-2021-41092.json index 922ca4f70dc..0b6b402d817 100644 --- a/2021/41xxx/CVE-2021-41092.json +++ b/2021/41xxx/CVE-2021-41092.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41092", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Docker CLI leaks private registry credentials to registry-1.docker.io" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "cli", + "version": { + "version_data": [ + { + "version_value": "< 20.10.9" + } + ] + } + } + ] + }, + "vendor_name": "docker" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v", + "refsource": "CONFIRM", + "url": "https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v" + }, + { + "name": "https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b", + "refsource": "MISC", + "url": "https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b" + } + ] + }, + "source": { + "advisory": "GHSA-99pg-grm5-qq3v", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41093.json b/2021/41xxx/CVE-2021-41093.json index b98880fd6d1..893f2708558 100644 --- a/2021/41xxx/CVE-2021-41093.json +++ b/2021/41xxx/CVE-2021-41093.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41093", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Account takeover when having only access to a user's short lived token" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "wire-ios", + "version": { + "version_data": [ + { + "version_value": "< 3.86" + } + ] + } + } + ] + }, + "vendor_name": "wireapp" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wire is an open source secure messenger. In affected versions if the an attacker gets an old but valid access token they can take over an account by changing the email. This issue has been resolved in version 3.86 which uses a new endpoint which additionally requires an authentication cookie. See wire-ios-sync-engine and wire-ios-transport references. This is the root advisory that pulls the changes together." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/wireapp/wire-ios/security/advisories/GHSA-6f4c-phfj-m255", + "refsource": "CONFIRM", + "url": "https://github.com/wireapp/wire-ios/security/advisories/GHSA-6f4c-phfj-m255" + }, + { + "name": "https://github.com/wireapp/wire-ios-sync-engine/security/advisories/GHSA-w727-5f74-49xj", + "refsource": "MISC", + "url": "https://github.com/wireapp/wire-ios-sync-engine/security/advisories/GHSA-w727-5f74-49xj" + }, + { + "name": "https://github.com/wireapp/wire-ios-transport/security/advisories/GHSA-p354-6r3m-g4xr", + "refsource": "MISC", + "url": "https://github.com/wireapp/wire-ios-transport/security/advisories/GHSA-p354-6r3m-g4xr" + }, + { + "name": "https://github.com/wireapp/wire-server/security/advisories/GHSA-9rm2-w6pq-333m", + "refsource": "MISC", + "url": "https://github.com/wireapp/wire-server/security/advisories/GHSA-9rm2-w6pq-333m" + }, + { + "name": "https://github.com/wireapp/wire-ios/commit/b0e7bb3b13dd8212032cb46e32edf701694687c7", + "refsource": "MISC", + "url": "https://github.com/wireapp/wire-ios/commit/b0e7bb3b13dd8212032cb46e32edf701694687c7" + } + ] + }, + "source": { + "advisory": "GHSA-6f4c-phfj-m255", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41094.json b/2021/41xxx/CVE-2021-41094.json index 8180b4ab60f..26c36aee9dd 100644 --- a/2021/41xxx/CVE-2021-41094.json +++ b/2021/41xxx/CVE-2021-41094.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41094", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Mandatory encryption at rest can be bypassed (UI) in Wire app" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "wire-ios", + "version": { + "version_data": [ + { + "version_value": ">= 3.68, < 3.70" + } + ] + } + } + ] + }, + "vendor_name": "wireapp" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wire is an open source secure messenger. Users of Wire by Bund may bypass the mandatory encryption at rest feature by simply disabling their device passcode. Upon launching, the app will attempt to enable encryption at rest by generating encryption keys via the Secure Enclave, however it will fail silently if no device passcode is set. The user has no indication that encryption at rest is not active since the feature is hidden to them. This issue has been resolved in version 3.70" } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-668: Exposure of Resource to Wrong Sphere" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/wireapp/wire-ios/security/advisories/GHSA-h4m7-pr8h-j7rf", + "refsource": "CONFIRM", + "url": "https://github.com/wireapp/wire-ios/security/advisories/GHSA-h4m7-pr8h-j7rf" + }, + { + "name": "https://github.com/wireapp/wire-ios/commit/5ba3eb180efc3fc795d095f9c84ae7f109b84746", + "refsource": "MISC", + "url": "https://github.com/wireapp/wire-ios/commit/5ba3eb180efc3fc795d095f9c84ae7f109b84746" + } + ] + }, + "source": { + "advisory": "GHSA-h4m7-pr8h-j7rf", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41099.json b/2021/41xxx/CVE-2021-41099.json index f2be7845377..93d25b5465f 100644 --- a/2021/41xxx/CVE-2021-41099.json +++ b/2021/41xxx/CVE-2021-41099.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41099", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integer overflow issue with strings in Redis" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "redis", + "version": { + "version_data": [ + { + "version_value": "< 5.0.14" + }, + { + "version_value": ">= 6.0.0, < 6.0.16" + }, + { + "version_value": ">= 6.2.0, 6.2.6" + } + ] + } + } + ] + }, + "vendor_name": "redis" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves changing the default proto-max-bulk-len configuration parameter to a very large value and constructing specially crafted network payloads or commands. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-680: Integer Overflow to Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph", + "refsource": "CONFIRM", + "url": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" + }, + { + "name": "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521", + "refsource": "MISC", + "url": "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" + } + ] + }, + "source": { + "advisory": "GHSA-j3cr-9h5g-6cph", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41100.json b/2021/41xxx/CVE-2021-41100.json index fe59bc5d9fb..8460abd5578 100644 --- a/2021/41xxx/CVE-2021-41100.json +++ b/2021/41xxx/CVE-2021-41100.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41100", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Account takeover when having only access to a user's short lived token in wire-server" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "wire-server", + "version": { + "version_data": [ + { + "version_value": "< 2021-08-16" + } + ] + } + } + ] + }, + "vendor_name": "wireapp" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wire-server is the backing server for the open source wire secure messaging application. In affected versions it is possible to trigger email address change of a user with only the short-lived session token in the `Authorization` header. As the short-lived token is only meant as means of authentication by the client for less critical requests to the backend, the ability to change the email address with a short-lived token constitutes a privilege escalation attack. Since the attacker can change the password after setting the email address to one that they control, changing the email address can result in an account takeover by the attacker. Short-lived tokens can be requested from the backend by Wire clients using the long lived tokens, after which the long lived tokens can be stored securely, for example on the devices key chain. The short lived tokens can then be used to authenticate the client towards the backend for frequently performed actions such as sending and receiving messages. While short-lived tokens should not be available to an attacker per-se, they are used more often and in the shape of an HTTP header, increasing the risk of exposure to an attacker relative to the long-lived tokens, which are stored and transmitted in cookies. If you are running an on-prem instance and provision all users with SCIM, you are not affected by this issue (changing email is blocked for SCIM users). SAML single-sign-on is unaffected by this issue, and behaves identically before and after this update. The reason is that the email address used as SAML NameID is stored in a different location in the databse from the one used to contact the user outside wire. Version 2021-08-16 and later provide a new end-point that requires both the long-lived client cookie and `Authorization` header. The old end-point has been removed. If you are running an on-prem instance with at least some of the users invited or provisioned via SAML SSO and you cannot update then you can block `/self/email` on nginz (or in any other proxies or firewalls you may have set up). You don't need to discriminate by verb: `/self/email` only accepts `PUT` and `DELETE`, and `DELETE` is almost never used." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/wireapp/wire-server/security/advisories/GHSA-9rm2-w6pq-333m", + "refsource": "CONFIRM", + "url": "https://github.com/wireapp/wire-server/security/advisories/GHSA-9rm2-w6pq-333m" + } + ] + }, + "source": { + "advisory": "GHSA-9rm2-w6pq-333m", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41101.json b/2021/41xxx/CVE-2021-41101.json index 91d2d9cfa5e..4d6e20bf725 100644 --- a/2021/41xxx/CVE-2021-41101.json +++ b/2021/41xxx/CVE-2021-41101.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41101", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "CORS `Access-Control-Allow-Origin` settings are too lenient" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "wire-server", + "version": { + "version_data": [ + { + "version_value": "< 2.106.0" + } + ] + } + } + ] + }, + "vendor_name": "wireapp" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS ` Access-Control-Allow-Origin ` header set by `nginz` is set for all subdomains of `.wire.com` (including `wire.com`). This means that if somebody were to find an XSS vector in any of the subdomains, they could use it to talk to the Wire API using the user's Cookie. A patch does not exist, but a workaround does. To make sure that a compromise of one subdomain does not yield access to the cookie of another, one may limit the `Access-Control-Allow-Origin` header to apps that actually require the cookie (account-pages, team-settings and the webapp)." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/wireapp/wire-server/security/advisories/GHSA-v7xx-cx8m-g66p", + "refsource": "CONFIRM", + "url": "https://github.com/wireapp/wire-server/security/advisories/GHSA-v7xx-cx8m-g66p" + } + ] + }, + "source": { + "advisory": "GHSA-v7xx-cx8m-g66p", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41103.json b/2021/41xxx/CVE-2021-41103.json index bfa678adb8a..2bc837bffa4 100644 --- a/2021/41xxx/CVE-2021-41103.json +++ b/2021/41xxx/CVE-2021-41103.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41103", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Insufficiently restricted permissions on plugin directories" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "containerd", + "version": { + "version_data": [ + { + "version_value": "< 1.4.11" + }, + { + "version_value": ">= 1.5.0, < 1.5.7" + } + ] + } + } + ] + }, + "vendor_name": "containerd" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update directory permission on container bundles directories." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq", + "refsource": "CONFIRM", + "url": "https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq" + }, + { + "name": "https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8", + "refsource": "MISC", + "url": "https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8" + } + ] + }, + "source": { + "advisory": "GHSA-c2h3-6mxw-7mvq", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41109.json b/2021/41xxx/CVE-2021-41109.json index 75abf7093d3..cca62bd0f28 100644 --- a/2021/41xxx/CVE-2021-41109.json +++ b/2021/41xxx/CVE-2021-41109.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41109", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "LiveQuery publishes user session tokens" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "parse-server", + "version": { + "version_data": [ + { + "version_value": "< 4.10.4" + } + ] + } + } + ] + }, + "vendor_name": "parse-community" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.4, for regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. A patch in version 4.10.4 removes session tokens from the LiveQuery payload. As a workaround, set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x", + "refsource": "CONFIRM", + "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x" + }, + { + "name": "https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559", + "refsource": "MISC", + "url": "https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559" + }, + { + "name": "https://github.com/parse-community/parse-server/releases/tag/4.10.4", + "refsource": "MISC", + "url": "https://github.com/parse-community/parse-server/releases/tag/4.10.4" + } + ] + }, + "source": { + "advisory": "GHSA-7pr3-p5fm-8r9x", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41110.json b/2021/41xxx/CVE-2021-41110.json index 716038e7c31..f2aeed2a32e 100644 --- a/2021/41xxx/CVE-2021-41110.json +++ b/2021/41xxx/CVE-2021-41110.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41110", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "CWL Viewer: deserialization of untrusted data can lead to complete takeover by an attacker" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "cwlviewer", + "version": { + "version_data": [ + { + "version_value": "< 1.3.1" + } + ] + } + } + ] + }, + "vendor_name": "common-workflow-language" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "cwlviewer is a web application to view and share Common Workflow Language workflows. Versions prior to 1.3.1 contain a Deserialization of Untrusted Data vulnerability. Commit number f6066f09edb70033a2ce80200e9fa9e70a5c29de (dated 2021-09-30) contains a patch. There are no available workarounds aside from installing the patch. The SnakeYaml constructor, by default, allows any data to be parsed. To fix the issue the object needs to be created with a `SafeConstructor` object, as seen in the patch." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502: Deserialization of Untrusted Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/common-workflow-language/cwlviewer/security/advisories/GHSA-7g7j-f5g3-fqp7", + "refsource": "CONFIRM", + "url": "https://github.com/common-workflow-language/cwlviewer/security/advisories/GHSA-7g7j-f5g3-fqp7" + }, + { + "name": "https://github.com/common-workflow-language/cwlviewer/commit/f6066f09edb70033a2ce80200e9fa9e70a5c29de", + "refsource": "MISC", + "url": "https://github.com/common-workflow-language/cwlviewer/commit/f6066f09edb70033a2ce80200e9fa9e70a5c29de" + }, + { + "name": "https://www.fatalerrors.org/a/analysis-of-the-snakeyaml-deserialization-in-java-security.html", + "refsource": "MISC", + "url": "https://www.fatalerrors.org/a/analysis-of-the-snakeyaml-deserialization-in-java-security.html" + } + ] + }, + "source": { + "advisory": "GHSA-7g7j-f5g3-fqp7", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41113.json b/2021/41xxx/CVE-2021-41113.json index 20b4b7faf4c..e0a82c528d6 100644 --- a/2021/41xxx/CVE-2021-41113.json +++ b/2021/41xxx/CVE-2021-41113.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41113", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": " Cross-Site-Request-Forgery in Backend URI Handling in Typo3" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "typo3", + "version": { + "version_data": [ + { + "version_value": ">= 11.2.0, < 11.5.0" + } + ] + } + } + ] + }, + "vendor_name": "TYPO3" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the new TYPO3 v11 feature that allows users to create and share deep links in the backend user interface is vulnerable to cross-site-request-forgery. The impact is the same as described in TYPO3-CORE-SA-2020-006 (CVE-2020-11069). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system. To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time. The following Same-Site cookie settings in $GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite] are required for an attack to be successful: SameSite=strict: malicious evil.example.org invoking TYPO3 application at good.example.org and SameSite=lax or none: malicious evil.com invoking TYPO3 application at example.org. Update your instance to TYPO3 version 11.5.0 which addresses the problem described." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw", + "refsource": "CONFIRM", + "url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw" + }, + { + "name": "https://github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f", + "refsource": "MISC", + "url": "https://github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f" + }, + { + "name": "https://typo3.org/security/advisory/typo3-core-sa-2020-006", + "refsource": "MISC", + "url": "https://typo3.org/security/advisory/typo3-core-sa-2020-006" + } + ] + }, + "source": { + "advisory": "GHSA-657m-v5vm-f6rw", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41114.json b/2021/41xxx/CVE-2021-41114.json index acfca7955a1..cc7cb6b0eda 100644 --- a/2021/41xxx/CVE-2021-41114.json +++ b/2021/41xxx/CVE-2021-41114.json @@ -1,18 +1,101 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41114", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": " HTTP Host Header Injection in Request Handling in Typo3" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "typo3", + "version": { + "version_data": [ + { + "version_value": ">= 11.0.0, < 11.5.0" + } + ] + } + } + ] + }, + "vendor_name": "TYPO3" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP Host header. TYPO3 uses the HTTP Host header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment. This vulnerability is the same as described in TYPO3-CORE-SA-2014-001 (CVE-2014-3941). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting $GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern'] (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm", + "refsource": "CONFIRM", + "url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm" + }, + { + "name": "https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4", + "refsource": "MISC", + "url": "https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4" + }, + { + "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-015", + "refsource": "MISC", + "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-015" + } + ] + }, + "source": { + "advisory": "GHSA-m2jh-fxw4-gphm", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41115.json b/2021/41xxx/CVE-2021-41115.json index c36d504622a..93b6911d0c1 100644 --- a/2021/41xxx/CVE-2021-41115.json +++ b/2021/41xxx/CVE-2021-41115.json @@ -1,18 +1,101 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41115", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Regular expression denial-of-service in Zulip" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "zulip", + "version": { + "version_data": [ + { + "version_value": "< 4.7" + } + ] + } + } + ] + }, + "vendor_name": "zulip" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zulip is an open source team chat server. In affected versions Zulip allows organization administrators on a server to configure \"linkifiers\" that automatically create links from messages that users send, detected via arbitrary regular expressions. Malicious organization administrators could subject the server to a denial-of-service via regular expression complexity attacks; most simply, by configuring a quadratic-time regular expression in a linkifier, and sending messages that exploited it. A regular expression attempted to parse the user-provided regexes to verify that they were safe from ReDoS -- this was both insufficient, as well as _itself_ subject to ReDoS if the organization administrator entered a sufficiently complex invalid regex. Affected users should [upgrade to the just-released Zulip 4.7](https://zulip.readthedocs.io/en/latest/production/upgrade-or-modify.html#upgrading-to-a-release), or [`main`](https://zulip.readthedocs.io/en/latest/production/upgrade-or-modify.html#upgrading-from-a-git-repository)." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400: Uncontrolled Resource Consumption" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-1333: Inefficient Regular Expression Complexity" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/zulip/zulip/security/advisories/GHSA-4h36-mqfq-42jg", + "refsource": "CONFIRM", + "url": "https://github.com/zulip/zulip/security/advisories/GHSA-4h36-mqfq-42jg" + }, + { + "name": "https://github.com/zulip/zulip/commit/e2d303c1bb5f538d17dc3d9134bc8858bdece781", + "refsource": "MISC", + "url": "https://github.com/zulip/zulip/commit/e2d303c1bb5f538d17dc3d9134bc8858bdece781" + }, + { + "name": "https://securitylab.github.com/advisories/GHSL-2021-118-zulip-zulip/", + "refsource": "MISC", + "url": "https://securitylab.github.com/advisories/GHSL-2021-118-zulip-zulip/" + } + ] + }, + "source": { + "advisory": "GHSA-4h36-mqfq-42jg", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41116.json b/2021/41xxx/CVE-2021-41116.json index 9050361986e..e3eb87d0dd1 100644 --- a/2021/41xxx/CVE-2021-41116.json +++ b/2021/41xxx/CVE-2021-41116.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41116", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Command injection in composer on Windows" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "composer", + "version": { + "version_data": [ + { + "version_value": "< 1.10.23" + }, + { + "version_value": ">= 2.0, < 2.1.9" + } + ] + } + } + ] + }, + "vendor_name": "composer" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf", + "refsource": "CONFIRM", + "url": "https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf" + }, + { + "name": "https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa", + "refsource": "MISC", + "url": "https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa" + } + ] + }, + "source": { + "advisory": "GHSA-frqg-7g38-6gcf", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41118.json b/2021/41xxx/CVE-2021-41118.json index da4cd67115c..2c112adadda 100644 --- a/2021/41xxx/CVE-2021-41118.json +++ b/2021/41xxx/CVE-2021-41118.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41118", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ReDoS in DynamicPageList3" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "DynamicPageList3", + "version": { + "version_data": [ + { + "version_value": "< 3.3.6" + } + ] + } + } + ] + }, + "vendor_name": "Universal-Omega" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The DynamicPageList3 extension is a reporting tool for MediaWiki, listing category members and intersections with various formats and details. In affected versions unsanitised input of regular expression date within the parameters of the DPL parser function, allowed for the possibility of ReDoS (Regex Denial of Service). This has been resolved in version 3.3.6. If you are unable to update you may also set `$wgDplSettings['functionalRichness'] = 0;` or disable DynamicPageList3 to mitigate." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400: Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/Universal-Omega/DynamicPageList3/security/advisories/GHSA-8f24-q75c-jhf4", + "refsource": "CONFIRM", + "url": "https://github.com/Universal-Omega/DynamicPageList3/security/advisories/GHSA-8f24-q75c-jhf4" + }, + { + "name": "https://github.com/Universal-Omega/DynamicPageList3/commit/2c04dafb37a14d9ccfe070f53e7f11bbca0156e7", + "refsource": "MISC", + "url": "https://github.com/Universal-Omega/DynamicPageList3/commit/2c04dafb37a14d9ccfe070f53e7f11bbca0156e7" + }, + { + "name": "https://github.com/Universal-Omega/DynamicPageList3/releases/tag/3.3.6", + "refsource": "MISC", + "url": "https://github.com/Universal-Omega/DynamicPageList3/releases/tag/3.3.6" + } + ] + }, + "source": { + "advisory": "GHSA-8f24-q75c-jhf4", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41120.json b/2021/41xxx/CVE-2021-41120.json index cee7ea5d562..812cd891dcd 100644 --- a/2021/41xxx/CVE-2021-41120.json +++ b/2021/41xxx/CVE-2021-41120.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41120", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Unauthorized access to Credit card form in sylius/paypal-plugin" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PayPalPlugin", + "version": { + "version_data": [ + { + "version_value": ">= 1.0.0, < 1.2.4" + }, + { + "version_value": ">= 1.3.0, < 1.3.1" + } + ] + } + } + ] + }, + "vendor_name": "Sylius" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "sylius/paypal-plugin is a paypal plugin for the Sylius development platform. In affected versions the URL to the payment page done after checkout was created with autoincremented payment id (/pay-with-paypal/{id}) and therefore it was easy to predict. The problem is that the Credit card form has prefilled \"credit card holder\" field with the Customer's first and last name and hence this can lead to personally identifiable information exposure. Additionally, the mentioned form did not require authentication. The problem has been patched in Sylius/PayPalPlugin 1.2.4 and 1.3.1. If users are unable to update they can override a sylius_paypal_plugin_pay_with_paypal_form route and change its URL parameters to (for example) {orderToken}/{paymentId}, then override the Sylius\\PayPalPlugin\\Controller\\PayWithPayPalFormAction service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. Additionally, one could override the @SyliusPayPalPlugin/payWithPaypal.html.twig template, to add contingencies: ['SCA_ALWAYS'] line in hostedFields.submit(...) function call (line 421). It would then have to be handled in the function callback." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7", + "refsource": "CONFIRM", + "url": "https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7" + }, + { + "name": "https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff", + "refsource": "MISC", + "url": "https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff" + }, + { + "name": "https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7", + "refsource": "MISC", + "url": "https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7" + } + ] + }, + "source": { + "advisory": "GHSA-25fx-mxc2-76g7", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41121.json b/2021/41xxx/CVE-2021-41121.json index f48b319a47a..aeb1e2489cd 100644 --- a/2021/41xxx/CVE-2021-41121.json +++ b/2021/41xxx/CVE-2021-41121.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41121", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Memory corruption in Vyper" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "vyper", + "version": { + "version_data": [ + { + "version_value": "< 0.3.0" + } + ] + } + } + ] + }, + "vendor_name": "vyperlang" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/vyperlang/vyper/pull/2447", + "refsource": "MISC", + "url": "https://github.com/vyperlang/vyper/pull/2447" + }, + { + "name": "https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv", + "refsource": "CONFIRM", + "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv" + } + ] + }, + "source": { + "advisory": "GHSA-xv8x-pr4h-73jv", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41122.json b/2021/41xxx/CVE-2021-41122.json index 262f6976287..e4113497db1 100644 --- a/2021/41xxx/CVE-2021-41122.json +++ b/2021/41xxx/CVE-2021-41122.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41122", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Bounds check missing for decimal args in Vyper" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "vyper", + "version": { + "version_data": [ + { + "version_value": "< 0.3.0" + } + ] + } + } + ] + }, + "vendor_name": "vyperlang" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-682: Incorrect Calculation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46", + "refsource": "CONFIRM", + "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46" + }, + { + "name": "https://github.com/vyperlang/vyper/pull/2447", + "refsource": "MISC", + "url": "https://github.com/vyperlang/vyper/pull/2447" + } + ] + }, + "source": { + "advisory": "GHSA-c7pr-343r-5c46", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41123.json b/2021/41xxx/CVE-2021-41123.json index eb9d24df8b4..4929149c8c3 100644 --- a/2021/41xxx/CVE-2021-41123.json +++ b/2021/41xxx/CVE-2021-41123.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41123", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Exposure of Sensitive Information to an Unauthorized Actor in WB.UI.Headquarters.dll" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "surveysolutions", + "version": { + "version_data": [ + { + "version_value": "< 21.09.1" + } + ] + } + } + ] + }, + "vendor_name": "surveysolutions" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Survey Solutions is a survey management and data collection system. In affected versions the Headquarters application publishes /metrics endpoint available to any user. None of the survey answers are ever exposed, only the aggregate counters, including count of interviews, or count of assignments. Starting from version 21.09.1 the endpoint is turned off by default." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/surveysolutions/surveysolutions/security/advisories/GHSA-6c7j-7jf3-9p3j", + "refsource": "CONFIRM", + "url": "https://github.com/surveysolutions/surveysolutions/security/advisories/GHSA-6c7j-7jf3-9p3j" + }, + { + "name": "https://github.com/surveysolutions/surveysolutions/commit/99e7e8345cb98f2eda08e37976e3d3aeb49971c9", + "refsource": "MISC", + "url": "https://github.com/surveysolutions/surveysolutions/commit/99e7e8345cb98f2eda08e37976e3d3aeb49971c9" + } + ] + }, + "source": { + "advisory": "GHSA-6c7j-7jf3-9p3j", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41124.json b/2021/41xxx/CVE-2021-41124.json index d28774d6c7f..5707110a2e8 100644 --- a/2021/41xxx/CVE-2021-41124.json +++ b/2021/41xxx/CVE-2021-41124.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41124", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Splash authentication credentials potentially leaked to target websites in scrapy-splash" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "scrapy-splash", + "version": { + "version_data": [ + { + "version_value": "< 0.8.0" + } + ] + } + } + ] + }, + "vendor_name": "scrapy-plugins" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots)." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74", + "refsource": "CONFIRM", + "url": "https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74" + }, + { + "name": "https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31", + "refsource": "MISC", + "url": "https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31" + } + ] + }, + "source": { + "advisory": "GHSA-823f-cwm9-4g74", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41125.json b/2021/41xxx/CVE-2021-41125.json index f5cc326dcd7..97fd0a98156 100644 --- a/2021/41xxx/CVE-2021-41125.json +++ b/2021/41xxx/CVE-2021-41125.json @@ -1,18 +1,101 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41125", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "HTTP authentication credential leak to target websites in scrapy" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "scrapy", + "version": { + "version_data": [ + { + "version_value": "< 1.8.1" + }, + { + "version_value": ">= 2.0.0, < 2.5.1" + } + ] + } + } + ] + }, + "vendor_name": "scrapy" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using `HttpAuthMiddleware`." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498", + "refsource": "CONFIRM", + "url": "https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498" + }, + { + "name": "https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6", + "refsource": "MISC", + "url": "https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6" + }, + { + "name": "https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header", + "refsource": "MISC", + "url": "https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header" + }, + { + "name": "http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth", + "refsource": "MISC", + "url": "http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth" + } + ] + }, + "source": { + "advisory": "GHSA-jwqp-28gf-p498", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41126.json b/2021/41xxx/CVE-2021-41126.json index b85d5977bc8..fae2ab35c95 100644 --- a/2021/41xxx/CVE-2021-41126.json +++ b/2021/41xxx/CVE-2021-41126.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41126", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Deleted Admin Can Sign In to Admin Interface" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "october", + "version": { + "version_data": [ + { + "version_value": ">= 2.0.0, < 2.1.12" + } + ] + } + } + ] + }, + "vendor_name": "octobercms" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "October is a Content Management System (CMS) and web platform built on the the Laravel PHP Framework. In affected versions administrator accounts which had previously been deleted may still be able to sign in to the backend using October CMS v2.0. The issue has been patched in v2.1.12 of the october/october package. There are no workarounds for this issue and all users should update." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7", + "refsource": "CONFIRM", + "url": "https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7" + }, + { + "name": "https://octobercms.com/changelog", + "refsource": "MISC", + "url": "https://octobercms.com/changelog" + } + ] + }, + "source": { + "advisory": "GHSA-6gjf-7w99-j7x7", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41128.json b/2021/41xxx/CVE-2021-41128.json index 2b17c1a3188..c28b5f397a5 100644 --- a/2021/41xxx/CVE-2021-41128.json +++ b/2021/41xxx/CVE-2021-41128.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41128", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "CSV Injection Vulnerability in Hygeia" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "hygeia", + "version": { + "version_data": [ + { + "version_value": "> 1.11.0, < 1.30.4" + } + ] + } + } + ] + }, + "vendor_name": "jshmrtn" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hygeia is an application for collecting and processing personal and case data in connection with communicable diseases. In affected versions all CSV Exports (Statistics & BAG MED) contain a CSV Injection Vulnerability. Users of the system are able to submit formula as exported fields which then get executed upon ingestion of the exported file. There is no validation or sanitization of these formula fields and so malicious may construct malicious code. This vulnerability has been resolved in version 1.30.4. There are no workarounds and all users are advised to upgrade their package." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://owasp.org/www-community/attacks/CSV_Injection", + "refsource": "MISC", + "url": "https://owasp.org/www-community/attacks/CSV_Injection" + }, + { + "name": "https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369", + "refsource": "CONFIRM", + "url": "https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369" + }, + { + "name": "https://github.com/beatrichartz/csv/issues/103", + "refsource": "MISC", + "url": "https://github.com/beatrichartz/csv/issues/103" + }, + { + "name": "https://github.com/beatrichartz/csv/pull/104", + "refsource": "MISC", + "url": "https://github.com/beatrichartz/csv/pull/104" + }, + { + "name": "https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60", + "refsource": "MISC", + "url": "https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60" + } + ] + }, + "source": { + "advisory": "GHSA-8pwv-jhj2-2369", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41129.json b/2021/41xxx/CVE-2021-41129.json index c0f4d11c34f..796da6e7223 100644 --- a/2021/41xxx/CVE-2021-41129.json +++ b/2021/41xxx/CVE-2021-41129.json @@ -1,18 +1,114 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41129", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Authentication bypass in Pterodactyl" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "panel", + "version": { + "version_data": [ + { + "version_value": ">= 1.0.0, < 1.6.2" + } + ] + } + } + ] + }, + "vendor_name": "pterodactyl" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user. Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user. This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`. There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user. At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably: 1.) The account referenced by the malicious cache key must have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow. 2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they must provide a valid two-factor authentication token. However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met: 3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker. In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502: Deserialization of Untrusted Data" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-639: Authorization Bypass Through User-Controlled Key" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-807: Reliance on Untrusted Inputs in a Security Decision" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4", + "refsource": "CONFIRM", + "url": "https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4" + }, + { + "name": "https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977", + "refsource": "MISC", + "url": "https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977" + }, + { + "name": "https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162", + "refsource": "MISC", + "url": "https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162" + }, + { + "name": "https://github.com/pterodactyl/panel/releases/tag/v1.6.2", + "refsource": "MISC", + "url": "https://github.com/pterodactyl/panel/releases/tag/v1.6.2" + } + ] + }, + "source": { + "advisory": "GHSA-5vfx-8w6m-h3v4", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41130.json b/2021/41xxx/CVE-2021-41130.json index 912b3953a67..4b1efbd94ad 100644 --- a/2021/41xxx/CVE-2021-41130.json +++ b/2021/41xxx/CVE-2021-41130.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41130", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "X-Endpoint-API-UserInfo can be spoofed in cloudendpoints Extensible Service Proxy" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "esp", + "version": { + "version_data": [ + { + "version_value": "< 1.58.0" + } + ] + } + } + ] + }, + "vendor_name": "cloudendpoints" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header \"X-Endpoint-API-UserInfo\", the application can use it to do authorization. But if there are two \"X-Endpoint-API-UserInfo\" headers from the client, ESPv1 only replaces the first one, the 2nd one will be passed to the application. An attacker can send two \"X-Endpoint-API-UserInfo\" headers, the second one with a fake JWT claim. Application may use the fake JWT claim to do the authorization. This impacts following ESPv1 usages: 1) Users have configured ESPv1 to do JWT authentication with Google ID Token as described in the referenced google endpoint document. 2) Users backend application is using the info in the \"X-Endpoint-API-UserInfo\" header to do the authorization. It has been fixed by v1.58.0. You need to patch it in the following ways: * If your docker image is using tag \":1\", needs to re-start the container to pick up the new version. The tag \":1\" will automatically point to the latest version. * If your docker image tag pings to a specific minor version, e.g. \":1.57\". You need to update it to \":1.58\" and re-start the container. There are no workaround for this issue." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-290: Authentication Bypass by Spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/cloudendpoints/esp/security/advisories/GHSA-43wx-8qmj-9r9q", + "refsource": "CONFIRM", + "url": "https://github.com/cloudendpoints/esp/security/advisories/GHSA-43wx-8qmj-9r9q" + }, + { + "name": "https://github.com/cloudendpoints/esp/commit/e310c4f91d229a072507f80c73811489b4cdff27", + "refsource": "MISC", + "url": "https://github.com/cloudendpoints/esp/commit/e310c4f91d229a072507f80c73811489b4cdff27" + }, + { + "name": "https://cloud.google.com/endpoints/docs/openapi/authenticating-users-google-id", + "refsource": "MISC", + "url": "https://cloud.google.com/endpoints/docs/openapi/authenticating-users-google-id" + }, + { + "name": "https://github.com/cloudendpoints/esp/releases/tag/v1.58.0", + "refsource": "MISC", + "url": "https://github.com/cloudendpoints/esp/releases/tag/v1.58.0" + } + ] + }, + "source": { + "advisory": "GHSA-43wx-8qmj-9r9q", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41133.json b/2021/41xxx/CVE-2021-41133.json index c84078e4d5e..e3461d60abf 100644 --- a/2021/41xxx/CVE-2021-41133.json +++ b/2021/41xxx/CVE-2021-41133.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41133", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Sandbox bypass via recent VFS-manipulating syscalls" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "flatpak", + "version": { + "version_data": [ + { + "version_value": ">= 1.8.0, <= 1.8.2" + }, + { + "version_value": ">= 1.10.0, < 1.10.4" + }, + { + "version_value": ">= 1.11.0, < 1.12.0" + } + ] + } + } + ] + }, + "vendor_name": "flatpak" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q", + "refsource": "CONFIRM", + "url": "https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/1330662f33a55e88bfe18e76de28b7922d91a999", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/1330662f33a55e88bfe18e76de28b7922d91a999" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/26b12484eb8a6219b9e7aa287b298a894b2f34ca", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/26b12484eb8a6219b9e7aa287b298a894b2f34ca" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/4c34815784e9ffda5733225c7d95824f96375e36", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/4c34815784e9ffda5733225c7d95824f96375e36" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/89ae9fe74c6d445bb1b3a40e568d77cf5de47e48", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/89ae9fe74c6d445bb1b3a40e568d77cf5de47e48" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/9766ee05b1425db397d2cf23afd24c7f6146a69f", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/9766ee05b1425db397d2cf23afd24c7f6146a69f" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/a10f52a7565c549612c92b8e736a6698a53db330", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/a10f52a7565c549612c92b8e736a6698a53db330" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/e26ac7586c392b5eb35ff4609fe232c52523b2cf", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/e26ac7586c392b5eb35ff4609fe232c52523b2cf" + } + ] + }, + "source": { + "advisory": "GHSA-67h7-w3jq-vh4q", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41285.json b/2021/41xxx/CVE-2021-41285.json index 16b7ebc2d9f..a3958390e0c 100644 --- a/2021/41xxx/CVE-2021-41285.json +++ b/2021/41xxx/CVE-2021-41285.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41285", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41285", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Ballistix MOD Utility through 2.0.2.5 is vulnerable to privilege escalation in the MODAPI.sys driver component. The vulnerability is triggered by sending a specific IOCTL request that allows low-privileged users to directly interact with physical memory via the MmMapIoSpace function call (mapping physical memory into a virtual address space). Attackers could exploit this issue to achieve local privilege escalation to NT AUTHORITY\\SYSTEM." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/VoidSec/Exploit-Development/blob/master/windows/x64/kernel/crucial_Ballistix_MOD_Utility_v.2.0.2.5/crucial_Ballistix_MOD_Utility_v.2.0.2.5_memory_dump_PoC.cpp", + "url": "https://github.com/VoidSec/Exploit-Development/blob/master/windows/x64/kernel/crucial_Ballistix_MOD_Utility_v.2.0.2.5/crucial_Ballistix_MOD_Utility_v.2.0.2.5_memory_dump_PoC.cpp" + }, + { + "refsource": "MISC", + "name": "https://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/", + "url": "https://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/" } ] } diff --git a/2021/41xxx/CVE-2021-41286.json b/2021/41xxx/CVE-2021-41286.json index 9e2265c36b3..b8628ba7f8d 100644 --- a/2021/41xxx/CVE-2021-41286.json +++ b/2021/41xxx/CVE-2021-41286.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41286", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41286", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Omikron MultiCash Desktop 4.00.008.SP5 relies on a client-side authentication mechanism. When a user logs into the application, the validity of the password is checked locally. All communication to the database backend is made via the same technical account. Consequently, an attacker can attach a debugger to the process or create a patch that manipulates the behavior of the login function. When the function always returns the success value (corresponding to a correct password), an attacker can login with any desired account, such as the administrative account of the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt", + "refsource": "MISC", + "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt" } ] } diff --git a/2021/41xxx/CVE-2021-41288.json b/2021/41xxx/CVE-2021-41288.json index c06714de182..7956229f0f3 100644 --- a/2021/41xxx/CVE-2021-41288.json +++ b/2021/41xxx/CVE-2021-41288.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41288", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41288", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467", + "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125467" } ] } diff --git a/2021/41xxx/CVE-2021-41290.json b/2021/41xxx/CVE-2021-41290.json index eb8ac686f48..67feb2dea88 100644 --- a/2021/41xxx/CVE-2021-41290.json +++ b/2021/41xxx/CVE-2021-41290.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41291.json b/2021/41xxx/CVE-2021-41291.json index 3ae14114fbe..486041f6cad 100644 --- a/2021/41xxx/CVE-2021-41291.json +++ b/2021/41xxx/CVE-2021-41291.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5127-3cbd3-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5127-3cbd3-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5127-3cbd3-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41292.json b/2021/41xxx/CVE-2021-41292.json index 070496b33da..eda305024bc 100644 --- a/2021/41xxx/CVE-2021-41292.json +++ b/2021/41xxx/CVE-2021-41292.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41293.json b/2021/41xxx/CVE-2021-41293.json index b81d56f3bde..dc01b6b49e8 100644 --- a/2021/41xxx/CVE-2021-41293.json +++ b/2021/41xxx/CVE-2021-41293.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5129-7e623-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5129-7e623-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5129-7e623-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41294.json b/2021/41xxx/CVE-2021-41294.json index a15d8a921a4..c58e574532a 100644 --- a/2021/41xxx/CVE-2021-41294.json +++ b/2021/41xxx/CVE-2021-41294.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5130-7de92-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5130-7de92-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5130-7de92-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41295.json b/2021/41xxx/CVE-2021-41295.json index 04ea2afd339..2f2040a5fd5 100644 --- a/2021/41xxx/CVE-2021-41295.json +++ b/2021/41xxx/CVE-2021-41295.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5131-c653b-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5131-c653b-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5131-c653b-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41296.json b/2021/41xxx/CVE-2021-41296.json index 6b36185e856..3d2694ae041 100644 --- a/2021/41xxx/CVE-2021-41296.json +++ b/2021/41xxx/CVE-2021-41296.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5132-65705-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5132-65705-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5132-65705-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41297.json b/2021/41xxx/CVE-2021-41297.json index 6b85eb41d87..81c2ee39821 100644 --- a/2021/41xxx/CVE-2021-41297.json +++ b/2021/41xxx/CVE-2021-41297.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5133-f3c4b-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5133-f3c4b-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5133-f3c4b-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41298.json b/2021/41xxx/CVE-2021-41298.json index 297127c3c9e..34e76101790 100644 --- a/2021/41xxx/CVE-2021-41298.json +++ b/2021/41xxx/CVE-2021-41298.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5134-39f74-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5134-39f74-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5134-39f74-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41299.json b/2021/41xxx/CVE-2021-41299.json index 698c4a8fdcf..82a2c8dd39f 100644 --- a/2021/41xxx/CVE-2021-41299.json +++ b/2021/41xxx/CVE-2021-41299.json @@ -104,7 +104,7 @@ "description_data": [ { "lang": "eng", - "value": "ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator’s privilege without logging in." + "value": "ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator\u2019s privilege without logging in." } ] }, @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5135-a9f5c-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5135-a9f5c-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5135-a9f5c-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41300.json b/2021/41xxx/CVE-2021-41300.json index c827d5b94f5..01663c8bf70 100644 --- a/2021/41xxx/CVE-2021-41300.json +++ b/2021/41xxx/CVE-2021-41300.json @@ -104,7 +104,7 @@ "description_data": [ { "lang": "eng", - "value": "ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality." + "value": "ECOA BAS controller\u2019s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality." } ] }, @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5136-3e315-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5136-3e315-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5136-3e315-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41301.json b/2021/41xxx/CVE-2021-41301.json index e4ef12ac14e..466bbb3bb54 100644 --- a/2021/41xxx/CVE-2021-41301.json +++ b/2021/41xxx/CVE-2021-41301.json @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5137-730a6-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5137-730a6-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5137-730a6-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41302.json b/2021/41xxx/CVE-2021-41302.json index fbab9aa623b..3365c61fa4f 100644 --- a/2021/41xxx/CVE-2021-41302.json +++ b/2021/41xxx/CVE-2021-41302.json @@ -104,7 +104,7 @@ "description_data": [ { "lang": "eng", - "value": "ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege." + "value": "ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user\u2019s privilege." } ] }, @@ -142,8 +142,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5138-d40ae-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5138-d40ae-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5138-d40ae-1.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41318.json b/2021/41xxx/CVE-2021-41318.json index e815b073639..46bfdc662dd 100644 --- a/2021/41xxx/CVE-2021-41318.json +++ b/2021/41xxx/CVE-2021-41318.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://knowledgebase.progress.com/articles/Knowledge/WhatsUp-Gold-Security-Bulletin-September-2021", "url": "https://knowledgebase.progress.com/articles/Knowledge/WhatsUp-Gold-Security-Bulletin-September-2021" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164359/WhatsUpGold-21.0.3-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/164359/WhatsUpGold-21.0.3-Cross-Site-Scripting.html" } ] } diff --git a/2021/41xxx/CVE-2021-41322.json b/2021/41xxx/CVE-2021-41322.json index 25a5ebc63de..0a16119b0b0 100644 --- a/2021/41xxx/CVE-2021-41322.json +++ b/2021/41xxx/CVE-2021-41322.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41322", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41322", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Poly VVX 400/410 through 5.3.1 allows low-privileged users to change the Admin password by modifying a POST parameter to 120 during the password reset process." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.polycom.com/content/support.html", + "refsource": "MISC", + "name": "https://support.polycom.com/content/support.html" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html", + "url": "https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html" } ] } diff --git a/2021/41xxx/CVE-2021-41323.json b/2021/41xxx/CVE-2021-41323.json index 91ca3f2a589..76168e1c249 100644 --- a/2021/41xxx/CVE-2021-41323.json +++ b/2021/41xxx/CVE-2021-41323.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41323", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41323", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory traversal in the Compress feature in Pydio Cells 2.2.9 allows remote authenticated users to overwrite personal files, or Cells files belonging to any user, via the format parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212", + "url": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212" + }, + { + "refsource": "MISC", + "name": "https://github.com/pydio/cells/releases/tag/v2.2.12", + "url": "https://github.com/pydio/cells/releases/tag/v2.2.12" + }, + { + "refsource": "MISC", + "name": "https://charonv.net/Pydio-Broken-Access-Control/", + "url": "https://charonv.net/Pydio-Broken-Access-Control/" } ] } diff --git a/2021/41xxx/CVE-2021-41324.json b/2021/41xxx/CVE-2021-41324.json index 345f3bc69fc..b2ba9608b61 100644 --- a/2021/41xxx/CVE-2021-41324.json +++ b/2021/41xxx/CVE-2021-41324.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41324", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41324", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory traversal in the Copy, Move, and Delete features in Pydio Cells 2.2.9 allows remote authenticated users to enumerate personal files (or Cells files belonging to any user) via the nodes parameter (for Copy and Move) or via the Path parameter (for Delete)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212", + "url": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212" + }, + { + "refsource": "MISC", + "name": "https://github.com/pydio/cells/releases/tag/v2.2.12", + "url": "https://github.com/pydio/cells/releases/tag/v2.2.12" + }, + { + "refsource": "MISC", + "name": "https://charonv.net/Pydio-Broken-Access-Control/", + "url": "https://charonv.net/Pydio-Broken-Access-Control/" } ] } diff --git a/2021/41xxx/CVE-2021-41325.json b/2021/41xxx/CVE-2021-41325.json index a219ec9e8c9..c7c2ac019e2 100644 --- a/2021/41xxx/CVE-2021-41325.json +++ b/2021/41xxx/CVE-2021-41325.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41325", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41325", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212", + "url": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212" + }, + { + "refsource": "MISC", + "name": "https://github.com/pydio/cells/releases/tag/v2.2.12", + "url": "https://github.com/pydio/cells/releases/tag/v2.2.12" + }, + { + "refsource": "MISC", + "name": "https://charonv.net/Pydio-Broken-Access-Control/", + "url": "https://charonv.net/Pydio-Broken-Access-Control/" } ] } diff --git a/2021/41xxx/CVE-2021-41381.json b/2021/41xxx/CVE-2021-41381.json index 355583e05a7..7c406c84ae9 100644 --- a/2021/41xxx/CVE-2021-41381.json +++ b/2021/41xxx/CVE-2021-41381.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt", "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html", + "url": "http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html" } ] } diff --git a/2021/41xxx/CVE-2021-41456.json b/2021/41xxx/CVE-2021-41456.json index 4788e66ec49..89bc9121d30 100644 --- a/2021/41xxx/CVE-2021-41456.json +++ b/2021/41xxx/CVE-2021-41456.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41456", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41456", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1004 in the nhmldmx_send_sample() function szXmlTo parameter which leads to a denial of service vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1911", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1911" } ] } diff --git a/2021/41xxx/CVE-2021-41457.json b/2021/41xxx/CVE-2021-41457.json index 1bc3385a7ea..7935292a6be 100644 --- a/2021/41xxx/CVE-2021-41457.json +++ b/2021/41xxx/CVE-2021-41457.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41457", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41457", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a stack buffer overflow in MP4Box 1.1.0 at src/filters/dmx_nhml.c in nhmldmx_init_parsing which leads to a denial of service vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1909", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1909" } ] } diff --git a/2021/41xxx/CVE-2021-41459.json b/2021/41xxx/CVE-2021-41459.json index 59068351fb4..480874d531b 100644 --- a/2021/41xxx/CVE-2021-41459.json +++ b/2021/41xxx/CVE-2021-41459.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41459", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41459", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1008 in the nhmldmx_send_sample() function szXmlFrom parameter which leads to a denial of service vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1912", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1912" } ] } diff --git a/2021/41xxx/CVE-2021-41461.json b/2021/41xxx/CVE-2021-41461.json index a6c73de2d77..e67ae2db971 100644 --- a/2021/41xxx/CVE-2021-41461.json +++ b/2021/41xxx/CVE-2021-41461.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41461", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41461", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the mode parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/concrete5/concrete5-legacy/issues/2006", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy/issues/2006" + }, + { + "url": "https://github.com/concrete5/concrete5-legacy", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy" } ] } diff --git a/2021/41xxx/CVE-2021-41462.json b/2021/41xxx/CVE-2021-41462.json index fd9e1f28c27..ced891e0d77 100644 --- a/2021/41xxx/CVE-2021-41462.json +++ b/2021/41xxx/CVE-2021-41462.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41462", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41462", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the ctID parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/concrete5/concrete5-legacy/issues/2006", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy/issues/2006" + }, + { + "url": "https://github.com/concrete5/concrete5-legacy", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy" } ] } diff --git a/2021/41xxx/CVE-2021-41463.json b/2021/41xxx/CVE-2021-41463.json index 3b6f74fac7c..fc529a29340 100644 --- a/2021/41xxx/CVE-2021-41463.json +++ b/2021/41xxx/CVE-2021-41463.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41463", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41463", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in toos/permissions/dialogs/access/entity/types/group_combination.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the cID parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/concrete5/concrete5-legacy/issues/2006", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy/issues/2006" + }, + { + "url": "https://github.com/concrete5/concrete5-legacy", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy" } ] } diff --git a/2021/41xxx/CVE-2021-41464.json b/2021/41xxx/CVE-2021-41464.json index 6f5099fcd0f..ad29d80a603 100644 --- a/2021/41xxx/CVE-2021-41464.json +++ b/2021/41xxx/CVE-2021-41464.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41464", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41464", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/concrete5/concrete5-legacy/issues/2006", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy/issues/2006" + }, + { + "url": "https://github.com/concrete5/concrete5-legacy", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy" } ] } diff --git a/2021/41xxx/CVE-2021-41465.json b/2021/41xxx/CVE-2021-41465.json index 79b5e9023ed..b0b8664e184 100644 --- a/2021/41xxx/CVE-2021-41465.json +++ b/2021/41xxx/CVE-2021-41465.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41465", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41465", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in concrete/elements/collection_theme.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/concrete5/concrete5-legacy/issues/2006", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy/issues/2006" + }, + { + "url": "https://github.com/concrete5/concrete5-legacy", + "refsource": "MISC", + "name": "https://github.com/concrete5/concrete5-legacy" } ] } diff --git a/2021/41xxx/CVE-2021-41467.json b/2021/41xxx/CVE-2021-41467.json index b224865bcc5..cfa6ba9ff9c 100644 --- a/2021/41xxx/CVE-2021-41467.json +++ b/2021/41xxx/CVE-2021-41467.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41467", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41467", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/hjue/JustWriting/issues/106", + "refsource": "MISC", + "name": "https://github.com/hjue/JustWriting/issues/106" + }, + { + "url": "https://github.com/hjue/JustWriting/", + "refsource": "MISC", + "name": "https://github.com/hjue/JustWriting/" } ] } diff --git a/2021/41xxx/CVE-2021-41511.json b/2021/41xxx/CVE-2021-41511.json index 0fd85fd3caf..586d1de1510 100644 --- a/2021/41xxx/CVE-2021-41511.json +++ b/2021/41xxx/CVE-2021-41511.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41511", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41511", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sourcecodester.com/php/14883/lodging-reservation-management-system-php-free-source-code.html", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14883/lodging-reservation-management-system-php-free-source-code.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Ni7inSharma/CVE-2021-41511", + "url": "https://github.com/Ni7inSharma/CVE-2021-41511" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50372", + "url": "https://www.exploit-db.com/exploits/50372" } ] } diff --git a/2021/41xxx/CVE-2021-41524.json b/2021/41xxx/CVE-2021-41524.json index 699e3ab7b55..131b5f02f31 100644 --- a/2021/41xxx/CVE-2021-41524.json +++ b/2021/41xxx/CVE-2021-41524.json @@ -1,18 +1,114 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-41524", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "null pointer dereference in h2 fuzzing" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache HTTP Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.4.49" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Apache httpd team would like to thank LI ZHI XIN from NSFocus Security Team for reporting this issue." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": [ + { + "other": "moderate" + } + ], + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "name": "https://httpd.apache.org/security/vulnerabilities_24.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211005 CVE-2021-41524: Apache HTTP Server: null pointer dereference in h2 fuzzing", + "url": "http://www.openwall.com/lists/oss-security/2021/10/05/1" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5d2d4b6ac5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/" + }, + { + "refsource": "CISCO", + "name": "20211007 Apache HTTP Server Vulnerabilties: October 2021", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "timeline": [ + { + "lang": "eng", + "time": "2021-09-17", + "value": "reported by Gerald Lee" + }, + { + "lang": "eng", + "time": "2021-09-26", + "value": "fixed by r1893655 in 2.4.x" + } + ], + "work_around": [ + { + "lang": "eng", + "value": "Disable the HTTP/2 protocol." + } + ] } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41530.json b/2021/41xxx/CVE-2021-41530.json index a178e397ccb..76128396158 100644 --- a/2021/41xxx/CVE-2021-41530.json +++ b/2021/41xxx/CVE-2021-41530.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-41530", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@forcepoint.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Forcepoint Next Generation Firewall", + "version": { + "version_data": [ + { + "version_value": "NGFW Engine versions 6.5.11 and earlier, 6.8.6 and earlier, and 6.10.0 are all vulnerable, if HTTP User Response has been configured." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reflected Amplification Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://help.forcepoint.com/security/CVE/CVE-2021-41530.html", + "url": "https://help.forcepoint.com/security/CVE/CVE-2021-41530.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Forcepoint NGFW Engine versions 6.5.11 and earlier, 6.8.6 and earlier, and 6.10.0 are vulnerable to TCP reflected amplification vulnerability, if HTTP User Response has been configured." } ] } diff --git a/2021/41xxx/CVE-2021-41533.json b/2021/41xxx/CVE-2021-41533.json index 40cc7e1d973..4e2c478e468 100644 --- a/2021/41xxx/CVE-2021-41533.json +++ b/2021/41xxx/CVE-2021-41533.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1117/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1117/" } ] } diff --git a/2021/41xxx/CVE-2021-41534.json b/2021/41xxx/CVE-2021-41534.json index 0d69502739d..8285b825dbd 100644 --- a/2021/41xxx/CVE-2021-41534.json +++ b/2021/41xxx/CVE-2021-41534.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1118/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1118/" } ] } diff --git a/2021/41xxx/CVE-2021-41535.json b/2021/41xxx/CVE-2021-41535.json index f7827337788..c812cfa5aa3 100644 --- a/2021/41xxx/CVE-2021-41535.json +++ b/2021/41xxx/CVE-2021-41535.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" } ] } diff --git a/2021/41xxx/CVE-2021-41536.json b/2021/41xxx/CVE-2021-41536.json index 2125030589e..71e76aba4b4 100644 --- a/2021/41xxx/CVE-2021-41536.json +++ b/2021/41xxx/CVE-2021-41536.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1120/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1120/" } ] } diff --git a/2021/41xxx/CVE-2021-41537.json b/2021/41xxx/CVE-2021-41537.json index 51ab7284ef2..049331cf37a 100644 --- a/2021/41xxx/CVE-2021-41537.json +++ b/2021/41xxx/CVE-2021-41537.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1121/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1121/" } ] } diff --git a/2021/41xxx/CVE-2021-41538.json b/2021/41xxx/CVE-2021-41538.json index 9e2ef09b8bf..66e0a6cd884 100644 --- a/2021/41xxx/CVE-2021-41538.json +++ b/2021/41xxx/CVE-2021-41538.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ] } diff --git a/2021/41xxx/CVE-2021-41539.json b/2021/41xxx/CVE-2021-41539.json index f80b82778b3..579327e54c7 100644 --- a/2021/41xxx/CVE-2021-41539.json +++ b/2021/41xxx/CVE-2021-41539.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1123/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1123/" } ] } diff --git a/2021/41xxx/CVE-2021-41540.json b/2021/41xxx/CVE-2021-41540.json index d03a56b64d9..f26d975cbcf 100644 --- a/2021/41xxx/CVE-2021-41540.json +++ b/2021/41xxx/CVE-2021-41540.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1124/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1124/" } ] } diff --git a/2021/41xxx/CVE-2021-41553.json b/2021/41xxx/CVE-2021-41553.json index 94140f1f6bf..0e8e8798c35 100644 --- a/2021/41xxx/CVE-2021-41553.json +++ b/2021/41xxx/CVE-2021-41553.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41553", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41553", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), the Web Application in /archibus/login.axvw assign a session token that could be already in use by another user. It was therefore possible to access the application through a user whose credentials were not known, without any attempt by the testers to modify the application logic. It is also possible to set the value of the session token, client-side, simply by making an unauthenticated GET Request to the Home Page and adding an arbitrary value to the JSESSIONID field. The application, following the login, does not assign a new token, continuing to keep the inserted one, as the identifier of the entire session. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.gruppotim.it/redteam", + "url": "https://www.gruppotim.it/redteam" } ] } diff --git a/2021/41xxx/CVE-2021-41554.json b/2021/41xxx/CVE-2021-41554.json index a9450de1f8e..796bdca21a7 100644 --- a/2021/41xxx/CVE-2021-41554.json +++ b/2021/41xxx/CVE-2021-41554.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41554", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41554", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPORTED WHEN ASSIGNED ** ARCHIBUS Web Central 21.3.3.815 (a version from 2014) does not properly validate requests for access to data and functionality in these affected endpoints: /archibus/schema/ab-edit-users.axvw, /archibus/schema/ab-data-dictionary-table.axvw, /archibus/schema/ab-schema-add-field.axvw, /archibus/schema/ab-core/views/process-navigator/ab-my-user-profile.axvw. By not verifying the permissions for access to resources, it allows a potential attacker to view pages that are not allowed. Specifically, it was found that any authenticated user can reach the administrative console for user management by directly requesting access to the page via URL. This allows a malicious user to modify all users' profiles, to elevate any privileges to administrative ones, or to create or delete any type of user. It is also possible to modify the emails of other users, through a misconfiguration of the username parameter, on the user profile page. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.gruppotim.it/redteam", + "url": "https://www.gruppotim.it/redteam" } ] } diff --git a/2021/41xxx/CVE-2021-41555.json b/2021/41xxx/CVE-2021-41555.json index b52da060f92..aedb84f4d20 100644 --- a/2021/41xxx/CVE-2021-41555.json +++ b/2021/41xxx/CVE-2021-41555.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41555", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41555", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.gruppotim.it/redteam", + "url": "https://www.gruppotim.it/redteam" } ] } diff --git a/2021/41xxx/CVE-2021-41578.json b/2021/41xxx/CVE-2021-41578.json index 0adeebba64f..12a560c2453 100644 --- a/2021/41xxx/CVE-2021-41578.json +++ b/2021/41xxx/CVE-2021-41578.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41578", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41578", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "mySCADA myDESIGNER 8.20.0 and below allows Directory Traversal attacks when importing project files. If an attacker can trick a victim into importing a malicious mep file, then they gain the ability to write arbitrary files to OS locations where the user has permission. This would typically lead to code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/jacob-baines/vuln_disclosure/blob/main/vuln_2021_05.txt", + "url": "https://github.com/jacob-baines/vuln_disclosure/blob/main/vuln_2021_05.txt" } ] } diff --git a/2021/41xxx/CVE-2021-41579.json b/2021/41xxx/CVE-2021-41579.json index 7f9a1afef23..3ad8a9b65f2 100644 --- a/2021/41xxx/CVE-2021-41579.json +++ b/2021/41xxx/CVE-2021-41579.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41579", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41579", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/jacob-baines/vuln_disclosure/blob/main/vuln_2021_04.txt", + "url": "https://github.com/jacob-baines/vuln_disclosure/blob/main/vuln_2021_04.txt" } ] } diff --git a/2021/41xxx/CVE-2021-41591.json b/2021/41xxx/CVE-2021-41591.json index 6f2a4142dab..d713081bbcf 100644 --- a/2021/41xxx/CVE-2021-41591.json +++ b/2021/41xxx/CVE-2021-41591.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41591", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41591", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ACINQ Eclair before 0.6.3 allows loss of funds because of dust HTLC exposure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html", + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html" + }, + { + "url": "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing", + "refsource": "MISC", + "name": "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing" + }, + { + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html", + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/ACINQ/eclair/pull/1985", + "url": "https://github.com/ACINQ/eclair/pull/1985" } ] } diff --git a/2021/41xxx/CVE-2021-41592.json b/2021/41xxx/CVE-2021-41592.json index e05b36c25b4..c692d249ffc 100644 --- a/2021/41xxx/CVE-2021-41592.json +++ b/2021/41xxx/CVE-2021-41592.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41592", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41592", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Blockstream c-lightning through 0.10.1 allows loss of funds because of dust HTLC exposure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html", + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html" + }, + { + "url": "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing", + "refsource": "MISC", + "name": "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing" + }, + { + "url": "https://github.com/ElementsProject/lightning", + "refsource": "MISC", + "name": "https://github.com/ElementsProject/lightning" + }, + { + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html", + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html" + }, + { + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html", + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html" } ] } diff --git a/2021/41xxx/CVE-2021-41593.json b/2021/41xxx/CVE-2021-41593.json index cb69f73a1f6..0108f99fc4e 100644 --- a/2021/41xxx/CVE-2021-41593.json +++ b/2021/41xxx/CVE-2021-41593.json @@ -1,17 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41593", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41593", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html", + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html" + }, + { + "url": "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing", + "refsource": "MISC", + "name": "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing" + }, + { + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html", + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta", + "url": "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta" + }, + { + "refsource": "MISC", + "name": "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md", + "url": "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md" + }, + { + "refsource": "MISC", + "name": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html", + "url": "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html" } ] } diff --git a/2021/41xxx/CVE-2021-41595.json b/2021/41xxx/CVE-2021-41595.json index 84b66ec1609..086ead11e21 100644 --- a/2021/41xxx/CVE-2021-41595.json +++ b/2021/41xxx/CVE-2021-41595.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41595", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41595", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the file_name parameter of the Step3 import functionality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/salesagility/SuiteCRM", + "refsource": "MISC", + "name": "https://github.com/salesagility/SuiteCRM" + }, + { + "refsource": "CONFIRM", + "name": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33", + "url": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33" + }, + { + "refsource": "CONFIRM", + "name": "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22", + "url": "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22" + }, + { + "refsource": "MISC", + "name": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41595.md", + "url": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41595.md" } ] } diff --git a/2021/41xxx/CVE-2021-41596.json b/2021/41xxx/CVE-2021-41596.json index c3ab31ee1c8..f07abb30e80 100644 --- a/2021/41xxx/CVE-2021-41596.json +++ b/2021/41xxx/CVE-2021-41596.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41596", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41596", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://suitecrm.com", + "refsource": "MISC", + "name": "https://suitecrm.com" + }, + { + "url": "https://github.com/salesagility/SuiteCRM", + "refsource": "MISC", + "name": "https://github.com/salesagility/SuiteCRM" + }, + { + "refsource": "CONFIRM", + "name": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33", + "url": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33" + }, + { + "refsource": "CONFIRM", + "name": "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22", + "url": "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22" + }, + { + "refsource": "MISC", + "name": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41596.md", + "url": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41596.md" } ] } diff --git a/2021/41xxx/CVE-2021-41617.json b/2021/41xxx/CVE-2021-41617.json index 443e8ee25bc..65d6dbdab73 100644 --- a/2021/41xxx/CVE-2021-41617.json +++ b/2021/41xxx/CVE-2021-41617.json @@ -71,6 +71,16 @@ "refsource": "CONFIRM", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1190975", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1190975" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-1f7339271d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f8df0f8563", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/" } ] } diff --git a/2021/41xxx/CVE-2021-41647.json b/2021/41xxx/CVE-2021-41647.json index 9fbfbb91c82..a9bf8235375 100644 --- a/2021/41xxx/CVE-2021-41647.json +++ b/2021/41xxx/CVE-2021-41647.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41647", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41647", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable \"username\" parameter in login.php and retrieve sensitive database information, as well as add an administrative user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App", + "refsource": "MISC", + "name": "https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App" + }, + { + "refsource": "MISC", + "name": "https://github.com/MobiusBinary/CVE-2021-41647", + "url": "https://github.com/MobiusBinary/CVE-2021-41647" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647", + "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647" } ] } diff --git a/2021/41xxx/CVE-2021-41648.json b/2021/41xxx/CVE-2021-41648.json index d21537cf3b5..5d11fd97d10 100644 --- a/2021/41xxx/CVE-2021-41648.json +++ b/2021/41xxx/CVE-2021-41648.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41648", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41648", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://awesomeopensource.com/project/PuneethReddyHC/online-shopping-system", + "refsource": "MISC", + "name": "https://awesomeopensource.com/project/PuneethReddyHC/online-shopping-system" + }, + { + "refsource": "MISC", + "name": "https://github.com/MobiusBinary/CVE-2021-41648", + "url": "https://github.com/MobiusBinary/CVE-2021-41648" } ] } diff --git a/2021/41xxx/CVE-2021-41649.json b/2021/41xxx/CVE-2021-41649.json index 43466b3ab5f..b6be55fa87d 100644 --- a/2021/41xxx/CVE-2021-41649.json +++ b/2021/41xxx/CVE-2021-41649.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41649", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41649", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://awesomeopensource.com/project/PuneethReddyHC/online-shopping-system", + "refsource": "MISC", + "name": "https://awesomeopensource.com/project/PuneethReddyHC/online-shopping-system" } ] } diff --git a/2021/41xxx/CVE-2021-41651.json b/2021/41xxx/CVE-2021-41651.json index f0050691e77..bf514e60687 100644 --- a/2021/41xxx/CVE-2021-41651.json +++ b/2021/41xxx/CVE-2021-41651.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41651", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41651", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A blind SQL injection vulnerability exists in the Raymart DG / Ahmed Helal Hotel-mgmt-system. A malicious attacker can retrieve sensitive database information and interact with the database using the vulnerable cid parameter in process_update_profile.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tramyardg/hotel-mgmt-system", + "refsource": "MISC", + "name": "https://github.com/tramyardg/hotel-mgmt-system" + }, + { + "refsource": "MISC", + "name": "https://github.com/MobiusBinary/CVE-2021-41651/", + "url": "https://github.com/MobiusBinary/CVE-2021-41651/" } ] } diff --git a/2021/41xxx/CVE-2021-41720.json b/2021/41xxx/CVE-2021-41720.json index 6611bf433c4..8c7187c7351 100644 --- a/2021/41xxx/CVE-2021-41720.json +++ b/2021/41xxx/CVE-2021-41720.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41720", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41720", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** DISPUTED ** A command injection vulnerability in Lodash 4.17.21 allows attackers to achieve arbitrary code execution via the template function. This is a different parameter, method, and version than CVE-2021-23337. NOTE: the vendor's position is that it's the developer's responsibility to ensure that a template does not evaluate code that originates from untrusted input." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/lodash/lodash/issues/5261", + "refsource": "MISC", + "name": "https://github.com/lodash/lodash/issues/5261" } ] } diff --git a/2021/41xxx/CVE-2021-41729.json b/2021/41xxx/CVE-2021-41729.json index 903d2487090..c115a1bc6e8 100644 --- a/2021/41xxx/CVE-2021-41729.json +++ b/2021/41xxx/CVE-2021-41729.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41729", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41729", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/meiko-S/BaiCloud-cms/issues/3", + "refsource": "MISC", + "name": "https://github.com/meiko-S/BaiCloud-cms/issues/3" } ] } diff --git a/2021/41xxx/CVE-2021-41770.json b/2021/41xxx/CVE-2021-41770.json index 7b100a04c63..4f88dcb1fc2 100644 --- a/2021/41xxx/CVE-2021-41770.json +++ b/2021/41xxx/CVE-2021-41770.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41770", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41770", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Ping Identity PingFederate before 10.3.1 mishandles pre-parsing validation, leading to an XXE attack that can achieve XML file disclosure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html", + "refsource": "MISC", + "name": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html" + }, + { + "refsource": "MISC", + "name": "https://docs.pingidentity.com/bundle/pingfederate-103/page/ruz1628492711606.html", + "url": "https://docs.pingidentity.com/bundle/pingfederate-103/page/ruz1628492711606.html" } ] } diff --git a/2021/41xxx/CVE-2021-41773.json b/2021/41xxx/CVE-2021-41773.json index 4a1fb309373..fc37b27f7e6 100644 --- a/2021/41xxx/CVE-2021-41773.json +++ b/2021/41xxx/CVE-2021-41773.json @@ -1,18 +1,154 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-41773", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache HTTP Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "Apache HTTP Server 2.4", + "version_value": "2.4.49" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was reported by Ash Daulton along with the cPanel Security Team" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by \"require all denied\" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": [ + { + "other": "important" + } + ], + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "name": "https://httpd.apache.org/security/vulnerabilities_24.html" + }, + { + "refsource": "MLIST", + "name": "[httpd-users] 20211005 [users@httpd] CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49", + "url": "https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20211005 CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49", + "url": "https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211005 CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49", + "url": "http://www.openwall.com/lists/oss-security/2021/10/05/2" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html", + "url": "http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 RE: CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/1" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html" + }, + { + "refsource": "MLIST", + "name": "[announce] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[httpd-users] 20211007 [users@httpd] CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/6" + }, + { + "refsource": "CISCO", + "name": "20211007 Apache HTTP Server Vulnerabilties: October 2021", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "http://www.openwall.com/lists/oss-security/2021/10/08/1" + }, + { + "refsource": "MLIST", + "name": "[httpd-cvs] 20211008 [httpd-site] branch main updated: * Align with CVE-2021-42013 based on the latest findings", + "url": "https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "timeline": [ + { + "lang": "eng", + "time": "2021-09-29", + "value": "reported" + }, + { + "lang": "eng", + "time": "2021-10-01", + "value": "fixed by r1893775 in 2.4.50" + } + ] } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41794.json b/2021/41xxx/CVE-2021-41794.json index 4f466f03a03..e123bfa92bc 100644 --- a/2021/41xxx/CVE-2021-41794.json +++ b/2021/41xxx/CVE-2021-41794.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41794", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41794", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with \"internet\" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/10/06/technical-advisory-open5gs-stack-buffer-overflow-during-pfcp-session-establishment-on-upf-cve-2021-41794", + "url": "https://research.nccgroup.com/2021/10/06/technical-advisory-open5gs-stack-buffer-overflow-during-pfcp-session-establishment-on-upf-cve-2021-41794" } ] } diff --git a/2021/41xxx/CVE-2021-41826.json b/2021/41xxx/CVE-2021-41826.json index 819502c8411..fdb1a466f89 100644 --- a/2021/41xxx/CVE-2021-41826.json +++ b/2021/41xxx/CVE-2021-41826.json @@ -56,6 +56,11 @@ "url": "https://github.com/PlaceOS/auth/issues/36", "refsource": "MISC", "name": "https://github.com/PlaceOS/auth/issues/36" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html", + "url": "http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html" } ] } diff --git a/2021/41xxx/CVE-2021-41830.json b/2021/41xxx/CVE-2021-41830.json new file mode 100644 index 00000000000..4154de700ff --- /dev/null +++ b/2021/41xxx/CVE-2021-41830.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41830", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41831.json b/2021/41xxx/CVE-2021-41831.json new file mode 100644 index 00000000000..329aec00f38 --- /dev/null +++ b/2021/41xxx/CVE-2021-41831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41832.json b/2021/41xxx/CVE-2021-41832.json new file mode 100644 index 00000000000..b8b7aea611f --- /dev/null +++ b/2021/41xxx/CVE-2021-41832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41833.json b/2021/41xxx/CVE-2021-41833.json new file mode 100644 index 00000000000..46fb7685c10 --- /dev/null +++ b/2021/41xxx/CVE-2021-41833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41837.json b/2021/41xxx/CVE-2021-41837.json new file mode 100644 index 00000000000..28db517e9e8 --- /dev/null +++ b/2021/41xxx/CVE-2021-41837.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41837", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41838.json b/2021/41xxx/CVE-2021-41838.json new file mode 100644 index 00000000000..01875ebf7fe --- /dev/null +++ b/2021/41xxx/CVE-2021-41838.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41838", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41839.json b/2021/41xxx/CVE-2021-41839.json new file mode 100644 index 00000000000..426632690d8 --- /dev/null +++ b/2021/41xxx/CVE-2021-41839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41840.json b/2021/41xxx/CVE-2021-41840.json new file mode 100644 index 00000000000..75dddcd34e8 --- /dev/null +++ b/2021/41xxx/CVE-2021-41840.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41840", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41841.json b/2021/41xxx/CVE-2021-41841.json new file mode 100644 index 00000000000..e68e4b26dce --- /dev/null +++ b/2021/41xxx/CVE-2021-41841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41842.json b/2021/41xxx/CVE-2021-41842.json new file mode 100644 index 00000000000..2b114e71946 --- /dev/null +++ b/2021/41xxx/CVE-2021-41842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41843.json b/2021/41xxx/CVE-2021-41843.json new file mode 100644 index 00000000000..4d88403ea6d --- /dev/null +++ b/2021/41xxx/CVE-2021-41843.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41843", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41844.json b/2021/41xxx/CVE-2021-41844.json new file mode 100644 index 00000000000..d7ac77cc151 --- /dev/null +++ b/2021/41xxx/CVE-2021-41844.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41844", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41845.json b/2021/41xxx/CVE-2021-41845.json new file mode 100644 index 00000000000..7a8ec22a98f --- /dev/null +++ b/2021/41xxx/CVE-2021-41845.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41845", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A SQL injection issue was discovered in ThycoticCentrify Secret Server before 11.0.000007. The only affected versions are 10.9.000032 through 11.0.000006." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.thycotic.com/bulletins/current/2021/11.0.000007.md", + "refsource": "MISC", + "name": "https://docs.thycotic.com/bulletins/current/2021/11.0.000007.md" + }, + { + "url": "https://docs.thycotic.com/ss/11.0.0/release-notes/ss-rn-11-0-000007.md", + "refsource": "MISC", + "name": "https://docs.thycotic.com/ss/11.0.0/release-notes/ss-rn-11-0-000007.md" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41846.json b/2021/41xxx/CVE-2021-41846.json new file mode 100644 index 00000000000..35be27c1408 --- /dev/null +++ b/2021/41xxx/CVE-2021-41846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41847.json b/2021/41xxx/CVE-2021-41847.json new file mode 100644 index 00000000000..6cd0da3d989 --- /dev/null +++ b/2021/41xxx/CVE-2021-41847.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41847", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in 3xLogic Infinias Access Control through 6.7.10708.0, affecting physical security. Users with login credentials assigned to a specific zone can send modified HTTP GET and POST requests, allowing them to view user data such as personal information and Prox card credentials. Also, an authorized user of one zone can send API requests to unlock electronic locks associated with zones they are unauthorized to have access to. They can also create new user logins for zones they were not authorized to access, including the root zone of the software." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.3xlogic.com/infinias-access-control", + "refsource": "MISC", + "name": "https://www.3xlogic.com/infinias-access-control" + }, + { + "refsource": "MISC", + "name": "https://grant-rose.com/infinias-access-control-vulnerability/", + "url": "https://grant-rose.com/infinias-access-control-vulnerability/" + }, + { + "refsource": "MISC", + "name": "https://gitlab.com/grose88/infinias", + "url": "https://gitlab.com/grose88/infinias" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41848.json b/2021/41xxx/CVE-2021-41848.json new file mode 100644 index 00000000000..5117769a940 --- /dev/null +++ b/2021/41xxx/CVE-2021-41848.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41848", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41849.json b/2021/41xxx/CVE-2021-41849.json new file mode 100644 index 00000000000..088a2ce237e --- /dev/null +++ b/2021/41xxx/CVE-2021-41849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41850.json b/2021/41xxx/CVE-2021-41850.json new file mode 100644 index 00000000000..873d7ab3903 --- /dev/null +++ b/2021/41xxx/CVE-2021-41850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41851.json b/2021/41xxx/CVE-2021-41851.json new file mode 100644 index 00000000000..175c49e29af --- /dev/null +++ b/2021/41xxx/CVE-2021-41851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41852.json b/2021/41xxx/CVE-2021-41852.json new file mode 100644 index 00000000000..49fa98ad149 --- /dev/null +++ b/2021/41xxx/CVE-2021-41852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41853.json b/2021/41xxx/CVE-2021-41853.json new file mode 100644 index 00000000000..2d336f346e5 --- /dev/null +++ b/2021/41xxx/CVE-2021-41853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41854.json b/2021/41xxx/CVE-2021-41854.json new file mode 100644 index 00000000000..e2b2c2b66e7 --- /dev/null +++ b/2021/41xxx/CVE-2021-41854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41855.json b/2021/41xxx/CVE-2021-41855.json new file mode 100644 index 00000000000..b3a59654f95 --- /dev/null +++ b/2021/41xxx/CVE-2021-41855.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41855", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41856.json b/2021/41xxx/CVE-2021-41856.json new file mode 100644 index 00000000000..58b574c0907 --- /dev/null +++ b/2021/41xxx/CVE-2021-41856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41857.json b/2021/41xxx/CVE-2021-41857.json new file mode 100644 index 00000000000..e8b3d29b8ce --- /dev/null +++ b/2021/41xxx/CVE-2021-41857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41858.json b/2021/41xxx/CVE-2021-41858.json new file mode 100644 index 00000000000..f3ecfd81ee1 --- /dev/null +++ b/2021/41xxx/CVE-2021-41858.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41858", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41859.json b/2021/41xxx/CVE-2021-41859.json new file mode 100644 index 00000000000..0c04b455665 --- /dev/null +++ b/2021/41xxx/CVE-2021-41859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41860.json b/2021/41xxx/CVE-2021-41860.json new file mode 100644 index 00000000000..8feb3f6b987 --- /dev/null +++ b/2021/41xxx/CVE-2021-41860.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41860", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41861.json b/2021/41xxx/CVE-2021-41861.json new file mode 100644 index 00000000000..bec3f5c3175 --- /dev/null +++ b/2021/41xxx/CVE-2021-41861.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41861", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Telegram application 7.5.0 through 7.8.0 for Android does not properly implement image self-destruction, a different vulnerability than CVE-2019-16248. After approximately two to four uses of the self-destruct feature, there is a misleading UI indication that an image was deleted (on both the sender and recipient sides). The images are still present in the /Storage/Emulated/0/Telegram/Telegram Image/ directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://habr.com/ru/post/580582/", + "refsource": "MISC", + "name": "https://habr.com/ru/post/580582/" + }, + { + "url": "https://telegram.org/blog/autodelete-inv2/ru#avtomaticheskoe-udalenie-soobschenii", + "refsource": "MISC", + "name": "https://telegram.org/blog/autodelete-inv2/ru#avtomaticheskoe-udalenie-soobschenii" + }, + { + "url": "https://desktop.telegram.org/changelog#v-2-6-23-02-21", + "refsource": "MISC", + "name": "https://desktop.telegram.org/changelog#v-2-6-23-02-21" + }, + { + "refsource": "MISC", + "name": "https://pikabu.ru/story/konfidentsialnost_polzovateley_telegram_snova_narushena_predstaviteli_messendzhera_trebuyut_ne_raskryivat_podrobnostey_8511495", + "url": "https://pikabu.ru/story/konfidentsialnost_polzovateley_telegram_snova_narushena_predstaviteli_messendzhera_trebuyut_ne_raskryivat_podrobnostey_8511495" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41862.json b/2021/41xxx/CVE-2021-41862.json new file mode 100644 index 00000000000..5414895ee94 --- /dev/null +++ b/2021/41xxx/CVE-2021-41862.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41862", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/killme2008/aviatorscript/issues/421", + "refsource": "MISC", + "name": "https://github.com/killme2008/aviatorscript/issues/421" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41863.json b/2021/41xxx/CVE-2021-41863.json new file mode 100644 index 00000000000..eeb35dbeae2 --- /dev/null +++ b/2021/41xxx/CVE-2021-41863.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41863", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41864.json b/2021/41xxx/CVE-2021-41864.json new file mode 100644 index 00000000000..175bb67a3a5 --- /dev/null +++ b/2021/41xxx/CVE-2021-41864.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41864", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel through 5.14.9 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a" + }, + { + "url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41865.json b/2021/41xxx/CVE-2021-41865.json new file mode 100644 index 00000000000..1d20c65bb94 --- /dev/null +++ b/2021/41xxx/CVE-2021-41865.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41865", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HashiCorp Nomad and Nomad Enterprise 1.1.1 through 1.1.5 allowed authenticated users with job submission capabilities to cause denial of service by submitting incomplete job specifications with a Consul mesh gateway and host networking mode. Fixed in 1.1.6." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://discuss.hashicorp.com/t/hcsec-2021-26-nomad-denial-of-service-via-submission-of-incomplete-job-specification-using-consul-mesh-gateway-host-network/30311", + "url": "https://discuss.hashicorp.com/t/hcsec-2021-26-nomad-denial-of-service-via-submission-of-incomplete-job-specification-using-consul-mesh-gateway-host-network/30311" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41866.json b/2021/41xxx/CVE-2021-41866.json new file mode 100644 index 00000000000..8c4f01f0d29 --- /dev/null +++ b/2021/41xxx/CVE-2021-41866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41867.json b/2021/41xxx/CVE-2021-41867.json new file mode 100644 index 00000000000..78db894d85d --- /dev/null +++ b/2021/41xxx/CVE-2021-41867.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41867", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", + "refsource": "MISC", + "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" + }, + { + "refsource": "MISC", + "name": "https://www.ihteam.net/advisory/onionshare/", + "url": "https://www.ihteam.net/advisory/onionshare/" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41868.json b/2021/41xxx/CVE-2021-41868.json new file mode 100644 index 00000000000..9bc6ffa85f9 --- /dev/null +++ b/2021/41xxx/CVE-2021-41868.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41868", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", + "refsource": "MISC", + "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" + }, + { + "refsource": "MISC", + "name": "https://www.ihteam.net/advisory/onionshare/", + "url": "https://www.ihteam.net/advisory/onionshare/" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41869.json b/2021/41xxx/CVE-2021-41869.json new file mode 100644 index 00000000000..1fad5777624 --- /dev/null +++ b/2021/41xxx/CVE-2021-41869.json @@ -0,0 +1,82 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41869", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SuiteCRM 7.10.x before 7.10.33 and 7.11.x before 7.11.22 is vulnerable to privilege escalation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://suitecrm.com", + "refsource": "MISC", + "name": "https://suitecrm.com" + }, + { + "url": "https://github.com/salesagility/SuiteCRM", + "refsource": "MISC", + "name": "https://github.com/salesagility/SuiteCRM" + }, + { + "url": "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22", + "refsource": "MISC", + "name": "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22" + }, + { + "url": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33", + "refsource": "MISC", + "name": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33" + }, + { + "refsource": "MISC", + "name": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41869.md", + "url": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41869.md" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41870.json b/2021/41xxx/CVE-2021-41870.json new file mode 100644 index 00000000000..ffa1a0bc777 --- /dev/null +++ b/2021/41xxx/CVE-2021-41870.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41870", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41871.json b/2021/41xxx/CVE-2021-41871.json new file mode 100644 index 00000000000..20edba557d9 --- /dev/null +++ b/2021/41xxx/CVE-2021-41871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41872.json b/2021/41xxx/CVE-2021-41872.json new file mode 100644 index 00000000000..a92720ea663 --- /dev/null +++ b/2021/41xxx/CVE-2021-41872.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41872", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41873.json b/2021/41xxx/CVE-2021-41873.json new file mode 100644 index 00000000000..88a5ae98bb4 --- /dev/null +++ b/2021/41xxx/CVE-2021-41873.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41873", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41874.json b/2021/41xxx/CVE-2021-41874.json new file mode 100644 index 00000000000..1115793586e --- /dev/null +++ b/2021/41xxx/CVE-2021-41874.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41874", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41875.json b/2021/41xxx/CVE-2021-41875.json new file mode 100644 index 00000000000..66049bfd087 --- /dev/null +++ b/2021/41xxx/CVE-2021-41875.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41875", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41876.json b/2021/41xxx/CVE-2021-41876.json new file mode 100644 index 00000000000..07baedf9b2a --- /dev/null +++ b/2021/41xxx/CVE-2021-41876.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41876", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41877.json b/2021/41xxx/CVE-2021-41877.json new file mode 100644 index 00000000000..292885e4f38 --- /dev/null +++ b/2021/41xxx/CVE-2021-41877.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41877", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41878.json b/2021/41xxx/CVE-2021-41878.json new file mode 100644 index 00000000000..16d28883926 --- /dev/null +++ b/2021/41xxx/CVE-2021-41878.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41878", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html", + "refsource": "MISC", + "name": "https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41879.json b/2021/41xxx/CVE-2021-41879.json new file mode 100644 index 00000000000..e639271ffcb --- /dev/null +++ b/2021/41xxx/CVE-2021-41879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41880.json b/2021/41xxx/CVE-2021-41880.json new file mode 100644 index 00000000000..3d37d05e83d --- /dev/null +++ b/2021/41xxx/CVE-2021-41880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41881.json b/2021/41xxx/CVE-2021-41881.json new file mode 100644 index 00000000000..5ba7fce2fd3 --- /dev/null +++ b/2021/41xxx/CVE-2021-41881.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41881", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41882.json b/2021/41xxx/CVE-2021-41882.json new file mode 100644 index 00000000000..0a99c57ec41 --- /dev/null +++ b/2021/41xxx/CVE-2021-41882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41883.json b/2021/41xxx/CVE-2021-41883.json new file mode 100644 index 00000000000..2a2738e9e3d --- /dev/null +++ b/2021/41xxx/CVE-2021-41883.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41883", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41884.json b/2021/41xxx/CVE-2021-41884.json new file mode 100644 index 00000000000..70b5bec159c --- /dev/null +++ b/2021/41xxx/CVE-2021-41884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41885.json b/2021/41xxx/CVE-2021-41885.json new file mode 100644 index 00000000000..232921c371c --- /dev/null +++ b/2021/41xxx/CVE-2021-41885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41886.json b/2021/41xxx/CVE-2021-41886.json new file mode 100644 index 00000000000..541369d2b72 --- /dev/null +++ b/2021/41xxx/CVE-2021-41886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41887.json b/2021/41xxx/CVE-2021-41887.json new file mode 100644 index 00000000000..7f3eb6a428e --- /dev/null +++ b/2021/41xxx/CVE-2021-41887.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41887", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41888.json b/2021/41xxx/CVE-2021-41888.json new file mode 100644 index 00000000000..cf9b5dcf484 --- /dev/null +++ b/2021/41xxx/CVE-2021-41888.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41889.json b/2021/41xxx/CVE-2021-41889.json new file mode 100644 index 00000000000..154ffc8180c --- /dev/null +++ b/2021/41xxx/CVE-2021-41889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41890.json b/2021/41xxx/CVE-2021-41890.json new file mode 100644 index 00000000000..a9f6eb3002a --- /dev/null +++ b/2021/41xxx/CVE-2021-41890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41891.json b/2021/41xxx/CVE-2021-41891.json new file mode 100644 index 00000000000..c54da97a28b --- /dev/null +++ b/2021/41xxx/CVE-2021-41891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41892.json b/2021/41xxx/CVE-2021-41892.json new file mode 100644 index 00000000000..600c6e0d1e7 --- /dev/null +++ b/2021/41xxx/CVE-2021-41892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41893.json b/2021/41xxx/CVE-2021-41893.json new file mode 100644 index 00000000000..3bd082085ad --- /dev/null +++ b/2021/41xxx/CVE-2021-41893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41894.json b/2021/41xxx/CVE-2021-41894.json new file mode 100644 index 00000000000..dfeaaa2f752 --- /dev/null +++ b/2021/41xxx/CVE-2021-41894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41895.json b/2021/41xxx/CVE-2021-41895.json new file mode 100644 index 00000000000..7338d3be974 --- /dev/null +++ b/2021/41xxx/CVE-2021-41895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41896.json b/2021/41xxx/CVE-2021-41896.json new file mode 100644 index 00000000000..58a75985752 --- /dev/null +++ b/2021/41xxx/CVE-2021-41896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41897.json b/2021/41xxx/CVE-2021-41897.json new file mode 100644 index 00000000000..410e2b59c8e --- /dev/null +++ b/2021/41xxx/CVE-2021-41897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41898.json b/2021/41xxx/CVE-2021-41898.json new file mode 100644 index 00000000000..a9f7a6b50e0 --- /dev/null +++ b/2021/41xxx/CVE-2021-41898.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41898", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41899.json b/2021/41xxx/CVE-2021-41899.json new file mode 100644 index 00000000000..d7175b8d40e --- /dev/null +++ b/2021/41xxx/CVE-2021-41899.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41899", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41900.json b/2021/41xxx/CVE-2021-41900.json new file mode 100644 index 00000000000..b843922338a --- /dev/null +++ b/2021/41xxx/CVE-2021-41900.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41900", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41901.json b/2021/41xxx/CVE-2021-41901.json new file mode 100644 index 00000000000..a889d6bf420 --- /dev/null +++ b/2021/41xxx/CVE-2021-41901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41902.json b/2021/41xxx/CVE-2021-41902.json new file mode 100644 index 00000000000..a391494b298 --- /dev/null +++ b/2021/41xxx/CVE-2021-41902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41903.json b/2021/41xxx/CVE-2021-41903.json new file mode 100644 index 00000000000..9351e999267 --- /dev/null +++ b/2021/41xxx/CVE-2021-41903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41904.json b/2021/41xxx/CVE-2021-41904.json new file mode 100644 index 00000000000..ff86492ec13 --- /dev/null +++ b/2021/41xxx/CVE-2021-41904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41905.json b/2021/41xxx/CVE-2021-41905.json new file mode 100644 index 00000000000..d9fbd3c6d89 --- /dev/null +++ b/2021/41xxx/CVE-2021-41905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41906.json b/2021/41xxx/CVE-2021-41906.json new file mode 100644 index 00000000000..601b4da274c --- /dev/null +++ b/2021/41xxx/CVE-2021-41906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41907.json b/2021/41xxx/CVE-2021-41907.json new file mode 100644 index 00000000000..0c47dc9a84e --- /dev/null +++ b/2021/41xxx/CVE-2021-41907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41908.json b/2021/41xxx/CVE-2021-41908.json new file mode 100644 index 00000000000..1cb0e62884f --- /dev/null +++ b/2021/41xxx/CVE-2021-41908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41909.json b/2021/41xxx/CVE-2021-41909.json new file mode 100644 index 00000000000..b4d85148cab --- /dev/null +++ b/2021/41xxx/CVE-2021-41909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41910.json b/2021/41xxx/CVE-2021-41910.json new file mode 100644 index 00000000000..f29960dc4be --- /dev/null +++ b/2021/41xxx/CVE-2021-41910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41911.json b/2021/41xxx/CVE-2021-41911.json new file mode 100644 index 00000000000..b248db61f53 --- /dev/null +++ b/2021/41xxx/CVE-2021-41911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41912.json b/2021/41xxx/CVE-2021-41912.json new file mode 100644 index 00000000000..274b27a81c7 --- /dev/null +++ b/2021/41xxx/CVE-2021-41912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41913.json b/2021/41xxx/CVE-2021-41913.json new file mode 100644 index 00000000000..07fabc5e574 --- /dev/null +++ b/2021/41xxx/CVE-2021-41913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41914.json b/2021/41xxx/CVE-2021-41914.json new file mode 100644 index 00000000000..33ce2bd319b --- /dev/null +++ b/2021/41xxx/CVE-2021-41914.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41914", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41915.json b/2021/41xxx/CVE-2021-41915.json new file mode 100644 index 00000000000..e91e799c7fe --- /dev/null +++ b/2021/41xxx/CVE-2021-41915.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41915", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41916.json b/2021/41xxx/CVE-2021-41916.json new file mode 100644 index 00000000000..d73d2b90433 --- /dev/null +++ b/2021/41xxx/CVE-2021-41916.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41916", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41917.json b/2021/41xxx/CVE-2021-41917.json new file mode 100644 index 00000000000..9de0836a4da --- /dev/null +++ b/2021/41xxx/CVE-2021-41917.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41917", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41918.json b/2021/41xxx/CVE-2021-41918.json new file mode 100644 index 00000000000..3f010ffc55b --- /dev/null +++ b/2021/41xxx/CVE-2021-41918.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41918", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41919.json b/2021/41xxx/CVE-2021-41919.json new file mode 100644 index 00000000000..3b795996c13 --- /dev/null +++ b/2021/41xxx/CVE-2021-41919.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41919", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41920.json b/2021/41xxx/CVE-2021-41920.json new file mode 100644 index 00000000000..c4a1e729739 --- /dev/null +++ b/2021/41xxx/CVE-2021-41920.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41920", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41921.json b/2021/41xxx/CVE-2021-41921.json new file mode 100644 index 00000000000..79bd632870a --- /dev/null +++ b/2021/41xxx/CVE-2021-41921.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41921", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41922.json b/2021/41xxx/CVE-2021-41922.json new file mode 100644 index 00000000000..3f15972c071 --- /dev/null +++ b/2021/41xxx/CVE-2021-41922.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41922", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41923.json b/2021/41xxx/CVE-2021-41923.json new file mode 100644 index 00000000000..a8ca2d0fe38 --- /dev/null +++ b/2021/41xxx/CVE-2021-41923.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41923", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41924.json b/2021/41xxx/CVE-2021-41924.json new file mode 100644 index 00000000000..131fcfc6c74 --- /dev/null +++ b/2021/41xxx/CVE-2021-41924.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41924", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41925.json b/2021/41xxx/CVE-2021-41925.json new file mode 100644 index 00000000000..6b7a9f4ffc4 --- /dev/null +++ b/2021/41xxx/CVE-2021-41925.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41925", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41926.json b/2021/41xxx/CVE-2021-41926.json new file mode 100644 index 00000000000..15e491f008f --- /dev/null +++ b/2021/41xxx/CVE-2021-41926.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41926", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41927.json b/2021/41xxx/CVE-2021-41927.json new file mode 100644 index 00000000000..3a1c56c6a96 --- /dev/null +++ b/2021/41xxx/CVE-2021-41927.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41927", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41928.json b/2021/41xxx/CVE-2021-41928.json new file mode 100644 index 00000000000..fc5cc86ceea --- /dev/null +++ b/2021/41xxx/CVE-2021-41928.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41928", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41929.json b/2021/41xxx/CVE-2021-41929.json new file mode 100644 index 00000000000..2fcb25c4b24 --- /dev/null +++ b/2021/41xxx/CVE-2021-41929.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41929", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41930.json b/2021/41xxx/CVE-2021-41930.json new file mode 100644 index 00000000000..4d31b1499e8 --- /dev/null +++ b/2021/41xxx/CVE-2021-41930.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41930", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41931.json b/2021/41xxx/CVE-2021-41931.json new file mode 100644 index 00000000000..ffa680ef843 --- /dev/null +++ b/2021/41xxx/CVE-2021-41931.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41931", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41932.json b/2021/41xxx/CVE-2021-41932.json new file mode 100644 index 00000000000..8e3d7c1a42d --- /dev/null +++ b/2021/41xxx/CVE-2021-41932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41933.json b/2021/41xxx/CVE-2021-41933.json new file mode 100644 index 00000000000..4331b51da19 --- /dev/null +++ b/2021/41xxx/CVE-2021-41933.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41933", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41934.json b/2021/41xxx/CVE-2021-41934.json new file mode 100644 index 00000000000..b87eb837777 --- /dev/null +++ b/2021/41xxx/CVE-2021-41934.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41934", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41935.json b/2021/41xxx/CVE-2021-41935.json new file mode 100644 index 00000000000..304b4460239 --- /dev/null +++ b/2021/41xxx/CVE-2021-41935.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41935", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41936.json b/2021/41xxx/CVE-2021-41936.json new file mode 100644 index 00000000000..38d78056690 --- /dev/null +++ b/2021/41xxx/CVE-2021-41936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41937.json b/2021/41xxx/CVE-2021-41937.json new file mode 100644 index 00000000000..f1f4da5ec99 --- /dev/null +++ b/2021/41xxx/CVE-2021-41937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41938.json b/2021/41xxx/CVE-2021-41938.json new file mode 100644 index 00000000000..cb53710c748 --- /dev/null +++ b/2021/41xxx/CVE-2021-41938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41939.json b/2021/41xxx/CVE-2021-41939.json new file mode 100644 index 00000000000..6304e5f4004 --- /dev/null +++ b/2021/41xxx/CVE-2021-41939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41940.json b/2021/41xxx/CVE-2021-41940.json new file mode 100644 index 00000000000..b83923fbb8b --- /dev/null +++ b/2021/41xxx/CVE-2021-41940.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41940", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41941.json b/2021/41xxx/CVE-2021-41941.json new file mode 100644 index 00000000000..bac044470c8 --- /dev/null +++ b/2021/41xxx/CVE-2021-41941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41942.json b/2021/41xxx/CVE-2021-41942.json new file mode 100644 index 00000000000..8339ca92bd7 --- /dev/null +++ b/2021/41xxx/CVE-2021-41942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41943.json b/2021/41xxx/CVE-2021-41943.json new file mode 100644 index 00000000000..641f4d60539 --- /dev/null +++ b/2021/41xxx/CVE-2021-41943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41944.json b/2021/41xxx/CVE-2021-41944.json new file mode 100644 index 00000000000..7046d72325d --- /dev/null +++ b/2021/41xxx/CVE-2021-41944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41945.json b/2021/41xxx/CVE-2021-41945.json new file mode 100644 index 00000000000..dc2e974e9e8 --- /dev/null +++ b/2021/41xxx/CVE-2021-41945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41946.json b/2021/41xxx/CVE-2021-41946.json new file mode 100644 index 00000000000..49a1f810639 --- /dev/null +++ b/2021/41xxx/CVE-2021-41946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41947.json b/2021/41xxx/CVE-2021-41947.json new file mode 100644 index 00000000000..262fb96ba17 --- /dev/null +++ b/2021/41xxx/CVE-2021-41947.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-41947", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A SQL injection vulnerability exists in Subrion CMS v4.2.1 in the visual-mode." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/intelliants/subrion/issues/887", + "refsource": "MISC", + "name": "https://github.com/intelliants/subrion/issues/887" + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41948.json b/2021/41xxx/CVE-2021-41948.json new file mode 100644 index 00000000000..71e7a14972b --- /dev/null +++ b/2021/41xxx/CVE-2021-41948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41949.json b/2021/41xxx/CVE-2021-41949.json new file mode 100644 index 00000000000..3d13ca5ca40 --- /dev/null +++ b/2021/41xxx/CVE-2021-41949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41950.json b/2021/41xxx/CVE-2021-41950.json new file mode 100644 index 00000000000..5cdb9c8c1ab --- /dev/null +++ b/2021/41xxx/CVE-2021-41950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41951.json b/2021/41xxx/CVE-2021-41951.json new file mode 100644 index 00000000000..8e4bad55fda --- /dev/null +++ b/2021/41xxx/CVE-2021-41951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41952.json b/2021/41xxx/CVE-2021-41952.json new file mode 100644 index 00000000000..f7df1f477e1 --- /dev/null +++ b/2021/41xxx/CVE-2021-41952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41953.json b/2021/41xxx/CVE-2021-41953.json new file mode 100644 index 00000000000..186f6bb8607 --- /dev/null +++ b/2021/41xxx/CVE-2021-41953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41954.json b/2021/41xxx/CVE-2021-41954.json new file mode 100644 index 00000000000..68f9f66a28e --- /dev/null +++ b/2021/41xxx/CVE-2021-41954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41955.json b/2021/41xxx/CVE-2021-41955.json new file mode 100644 index 00000000000..021a641dc51 --- /dev/null +++ b/2021/41xxx/CVE-2021-41955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41956.json b/2021/41xxx/CVE-2021-41956.json new file mode 100644 index 00000000000..8e5ad212e8c --- /dev/null +++ b/2021/41xxx/CVE-2021-41956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41957.json b/2021/41xxx/CVE-2021-41957.json new file mode 100644 index 00000000000..315e3a5dccd --- /dev/null +++ b/2021/41xxx/CVE-2021-41957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41958.json b/2021/41xxx/CVE-2021-41958.json new file mode 100644 index 00000000000..4a0350ed303 --- /dev/null +++ b/2021/41xxx/CVE-2021-41958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41959.json b/2021/41xxx/CVE-2021-41959.json new file mode 100644 index 00000000000..06498fb0398 --- /dev/null +++ b/2021/41xxx/CVE-2021-41959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41960.json b/2021/41xxx/CVE-2021-41960.json new file mode 100644 index 00000000000..889ef7c457f --- /dev/null +++ b/2021/41xxx/CVE-2021-41960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41961.json b/2021/41xxx/CVE-2021-41961.json new file mode 100644 index 00000000000..18c1bb78d64 --- /dev/null +++ b/2021/41xxx/CVE-2021-41961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41962.json b/2021/41xxx/CVE-2021-41962.json new file mode 100644 index 00000000000..7f3df18b6b1 --- /dev/null +++ b/2021/41xxx/CVE-2021-41962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41963.json b/2021/41xxx/CVE-2021-41963.json new file mode 100644 index 00000000000..019c7045f83 --- /dev/null +++ b/2021/41xxx/CVE-2021-41963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41964.json b/2021/41xxx/CVE-2021-41964.json new file mode 100644 index 00000000000..1b81c5a3ac7 --- /dev/null +++ b/2021/41xxx/CVE-2021-41964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41965.json b/2021/41xxx/CVE-2021-41965.json new file mode 100644 index 00000000000..84604cfc850 --- /dev/null +++ b/2021/41xxx/CVE-2021-41965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41966.json b/2021/41xxx/CVE-2021-41966.json new file mode 100644 index 00000000000..e21b9b7c514 --- /dev/null +++ b/2021/41xxx/CVE-2021-41966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41967.json b/2021/41xxx/CVE-2021-41967.json new file mode 100644 index 00000000000..3028d4ec981 --- /dev/null +++ b/2021/41xxx/CVE-2021-41967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41968.json b/2021/41xxx/CVE-2021-41968.json new file mode 100644 index 00000000000..d1d87295123 --- /dev/null +++ b/2021/41xxx/CVE-2021-41968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41969.json b/2021/41xxx/CVE-2021-41969.json new file mode 100644 index 00000000000..a180e7f2873 --- /dev/null +++ b/2021/41xxx/CVE-2021-41969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41970.json b/2021/41xxx/CVE-2021-41970.json new file mode 100644 index 00000000000..7eb9990edff --- /dev/null +++ b/2021/41xxx/CVE-2021-41970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41971.json b/2021/41xxx/CVE-2021-41971.json new file mode 100644 index 00000000000..0e708c715ac --- /dev/null +++ b/2021/41xxx/CVE-2021-41971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41972.json b/2021/41xxx/CVE-2021-41972.json new file mode 100644 index 00000000000..34caa1b9efc --- /dev/null +++ b/2021/41xxx/CVE-2021-41972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41973.json b/2021/41xxx/CVE-2021-41973.json new file mode 100644 index 00000000000..b4204242947 --- /dev/null +++ b/2021/41xxx/CVE-2021-41973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41974.json b/2021/41xxx/CVE-2021-41974.json new file mode 100644 index 00000000000..5c8bd4418ae --- /dev/null +++ b/2021/41xxx/CVE-2021-41974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41975.json b/2021/41xxx/CVE-2021-41975.json new file mode 100644 index 00000000000..dab8a5a15ca --- /dev/null +++ b/2021/41xxx/CVE-2021-41975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41976.json b/2021/41xxx/CVE-2021-41976.json new file mode 100644 index 00000000000..ab916751b86 --- /dev/null +++ b/2021/41xxx/CVE-2021-41976.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41976", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41977.json b/2021/41xxx/CVE-2021-41977.json new file mode 100644 index 00000000000..cc8d39d68f0 --- /dev/null +++ b/2021/41xxx/CVE-2021-41977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41978.json b/2021/41xxx/CVE-2021-41978.json new file mode 100644 index 00000000000..8d37ddfbf2b --- /dev/null +++ b/2021/41xxx/CVE-2021-41978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41979.json b/2021/41xxx/CVE-2021-41979.json new file mode 100644 index 00000000000..d3033585083 --- /dev/null +++ b/2021/41xxx/CVE-2021-41979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41980.json b/2021/41xxx/CVE-2021-41980.json new file mode 100644 index 00000000000..009bb4c1df3 --- /dev/null +++ b/2021/41xxx/CVE-2021-41980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41981.json b/2021/41xxx/CVE-2021-41981.json new file mode 100644 index 00000000000..2bcc8381a5e --- /dev/null +++ b/2021/41xxx/CVE-2021-41981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41982.json b/2021/41xxx/CVE-2021-41982.json new file mode 100644 index 00000000000..58ce075491b --- /dev/null +++ b/2021/41xxx/CVE-2021-41982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41983.json b/2021/41xxx/CVE-2021-41983.json new file mode 100644 index 00000000000..d071d3f1831 --- /dev/null +++ b/2021/41xxx/CVE-2021-41983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41984.json b/2021/41xxx/CVE-2021-41984.json new file mode 100644 index 00000000000..5caebf19464 --- /dev/null +++ b/2021/41xxx/CVE-2021-41984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41985.json b/2021/41xxx/CVE-2021-41985.json new file mode 100644 index 00000000000..ef59d46ee52 --- /dev/null +++ b/2021/41xxx/CVE-2021-41985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41986.json b/2021/41xxx/CVE-2021-41986.json new file mode 100644 index 00000000000..bc54ec2a5f5 --- /dev/null +++ b/2021/41xxx/CVE-2021-41986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41987.json b/2021/41xxx/CVE-2021-41987.json new file mode 100644 index 00000000000..a85af105cb3 --- /dev/null +++ b/2021/41xxx/CVE-2021-41987.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41987", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41988.json b/2021/41xxx/CVE-2021-41988.json new file mode 100644 index 00000000000..851bfbd2ee7 --- /dev/null +++ b/2021/41xxx/CVE-2021-41988.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41988", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41989.json b/2021/41xxx/CVE-2021-41989.json new file mode 100644 index 00000000000..560b9104603 --- /dev/null +++ b/2021/41xxx/CVE-2021-41989.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41989", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41990.json b/2021/41xxx/CVE-2021-41990.json new file mode 100644 index 00000000000..eb51c237c25 --- /dev/null +++ b/2021/41xxx/CVE-2021-41990.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41990", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41991.json b/2021/41xxx/CVE-2021-41991.json new file mode 100644 index 00000000000..823f46d4429 --- /dev/null +++ b/2021/41xxx/CVE-2021-41991.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41991", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41992.json b/2021/41xxx/CVE-2021-41992.json new file mode 100644 index 00000000000..9d53ebf45cd --- /dev/null +++ b/2021/41xxx/CVE-2021-41992.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41992", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41993.json b/2021/41xxx/CVE-2021-41993.json new file mode 100644 index 00000000000..a34a6e24382 --- /dev/null +++ b/2021/41xxx/CVE-2021-41993.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41993", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41994.json b/2021/41xxx/CVE-2021-41994.json new file mode 100644 index 00000000000..41d7d285bf9 --- /dev/null +++ b/2021/41xxx/CVE-2021-41994.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41994", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41995.json b/2021/41xxx/CVE-2021-41995.json new file mode 100644 index 00000000000..081c940f968 --- /dev/null +++ b/2021/41xxx/CVE-2021-41995.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41995", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41996.json b/2021/41xxx/CVE-2021-41996.json new file mode 100644 index 00000000000..8737ccf3359 --- /dev/null +++ b/2021/41xxx/CVE-2021-41996.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41996", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41997.json b/2021/41xxx/CVE-2021-41997.json new file mode 100644 index 00000000000..133cea74a8b --- /dev/null +++ b/2021/41xxx/CVE-2021-41997.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41997", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41998.json b/2021/41xxx/CVE-2021-41998.json new file mode 100644 index 00000000000..bddb048c22b --- /dev/null +++ b/2021/41xxx/CVE-2021-41998.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41998", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41999.json b/2021/41xxx/CVE-2021-41999.json new file mode 100644 index 00000000000..8ad6bed3acb --- /dev/null +++ b/2021/41xxx/CVE-2021-41999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42000.json b/2021/42xxx/CVE-2021-42000.json new file mode 100644 index 00000000000..63d5f86a503 --- /dev/null +++ b/2021/42xxx/CVE-2021-42000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42001.json b/2021/42xxx/CVE-2021-42001.json new file mode 100644 index 00000000000..9f78ebbb20f --- /dev/null +++ b/2021/42xxx/CVE-2021-42001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42002.json b/2021/42xxx/CVE-2021-42002.json new file mode 100644 index 00000000000..9558bce9f8a --- /dev/null +++ b/2021/42xxx/CVE-2021-42002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42003.json b/2021/42xxx/CVE-2021-42003.json new file mode 100644 index 00000000000..ebc2ddbe252 --- /dev/null +++ b/2021/42xxx/CVE-2021-42003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42004.json b/2021/42xxx/CVE-2021-42004.json new file mode 100644 index 00000000000..ab5fc4c8281 --- /dev/null +++ b/2021/42xxx/CVE-2021-42004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42005.json b/2021/42xxx/CVE-2021-42005.json new file mode 100644 index 00000000000..a6dc44119dc --- /dev/null +++ b/2021/42xxx/CVE-2021-42005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42006.json b/2021/42xxx/CVE-2021-42006.json new file mode 100644 index 00000000000..26ea1ad5e2a --- /dev/null +++ b/2021/42xxx/CVE-2021-42006.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42006", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An out-of-bounds access in GffLine::GffLine in gff.cpp in GCLib 0.12.7 allows an attacker to cause a segmentation fault or possibly have unspecified other impact via a crafted GFF file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpertea/gclib/issues/11", + "refsource": "MISC", + "name": "https://github.com/gpertea/gclib/issues/11" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42007.json b/2021/42xxx/CVE-2021-42007.json new file mode 100644 index 00000000000..5b42b47bcc2 --- /dev/null +++ b/2021/42xxx/CVE-2021-42007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42008.json b/2021/42xxx/CVE-2021-42008.json new file mode 100644 index 00000000000..ceeefdb7e8e --- /dev/null +++ b/2021/42xxx/CVE-2021-42008.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42008", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793" + }, + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13" + }, + { + "url": "https://www.youtube.com/watch?v=d5f9xLK8Vhw", + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=d5f9xLK8Vhw" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42009.json b/2021/42xxx/CVE-2021-42009.json new file mode 100644 index 00000000000..62597a785c6 --- /dev/null +++ b/2021/42xxx/CVE-2021-42009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42010.json b/2021/42xxx/CVE-2021-42010.json new file mode 100644 index 00000000000..8e5f335f0e3 --- /dev/null +++ b/2021/42xxx/CVE-2021-42010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42011.json b/2021/42xxx/CVE-2021-42011.json new file mode 100644 index 00000000000..b752a819379 --- /dev/null +++ b/2021/42xxx/CVE-2021-42011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42012.json b/2021/42xxx/CVE-2021-42012.json new file mode 100644 index 00000000000..e0e0f292a92 --- /dev/null +++ b/2021/42xxx/CVE-2021-42012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42013.json b/2021/42xxx/CVE-2021-42013.json new file mode 100644 index 00000000000..1f68c1fa7c5 --- /dev/null +++ b/2021/42xxx/CVE-2021-42013.json @@ -0,0 +1,129 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "security@apache.org", + "ID": "CVE-2021-42013", + "STATE": "PUBLIC", + "TITLE": "Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache HTTP Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "Apache HTTP Server", + "version_value": "2.4.49" + }, + { + "version_affected": "=", + "version_name": "Apache HTTP Server", + "version_value": "2.4.50" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Reported by Juan Escobar from Dreamlab Technologies, Fernando Mu\u00f1oz from NULL Life CTF Team, and Shungo Kumasaka" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": [ + { + "other": "critical" + } + ], + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "name": "https://httpd.apache.org/security/vulnerabilities_24.html" + }, + { + "refsource": "MLIST", + "name": "[announce] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[httpd-users] 20211007 [users@httpd] CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "http://www.openwall.com/lists/oss-security/2021/10/07/6" + }, + { + "refsource": "CISCO", + "name": "20211007 Apache HTTP Server Vulnerabilties: October 2021", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ" + }, + { + "refsource": "JVN", + "name": "JVN#51106450", + "url": "http://jvn.jp/en/jp/JVN51106450/index.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)", + "url": "http://www.openwall.com/lists/oss-security/2021/10/08/1" + }, + { + "refsource": "MLIST", + "name": "[httpd-cvs] 20211008 [httpd-site] branch main updated: * Align with CVE-2021-42013 based on the latest findings", + "url": "https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "timeline": [ + { + "lang": "eng", + "time": "2021-10-06", + "value": "reported" + } + ] +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42014.json b/2021/42xxx/CVE-2021-42014.json new file mode 100644 index 00000000000..d34bd8c17f2 --- /dev/null +++ b/2021/42xxx/CVE-2021-42014.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42014", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42015.json b/2021/42xxx/CVE-2021-42015.json new file mode 100644 index 00000000000..8e0dcccffd2 --- /dev/null +++ b/2021/42xxx/CVE-2021-42015.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42015", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42016.json b/2021/42xxx/CVE-2021-42016.json new file mode 100644 index 00000000000..8afc9a543b8 --- /dev/null +++ b/2021/42xxx/CVE-2021-42016.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42016", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42017.json b/2021/42xxx/CVE-2021-42017.json new file mode 100644 index 00000000000..1642445988a --- /dev/null +++ b/2021/42xxx/CVE-2021-42017.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42017", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42018.json b/2021/42xxx/CVE-2021-42018.json new file mode 100644 index 00000000000..8de335f2726 --- /dev/null +++ b/2021/42xxx/CVE-2021-42018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42019.json b/2021/42xxx/CVE-2021-42019.json new file mode 100644 index 00000000000..3143b55f2b5 --- /dev/null +++ b/2021/42xxx/CVE-2021-42019.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42019", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42020.json b/2021/42xxx/CVE-2021-42020.json new file mode 100644 index 00000000000..a49ed7e2138 --- /dev/null +++ b/2021/42xxx/CVE-2021-42020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42021.json b/2021/42xxx/CVE-2021-42021.json new file mode 100644 index 00000000000..5f071622b13 --- /dev/null +++ b/2021/42xxx/CVE-2021-42021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42022.json b/2021/42xxx/CVE-2021-42022.json new file mode 100644 index 00000000000..fb077370853 --- /dev/null +++ b/2021/42xxx/CVE-2021-42022.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42022", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42023.json b/2021/42xxx/CVE-2021-42023.json new file mode 100644 index 00000000000..f906ecb1298 --- /dev/null +++ b/2021/42xxx/CVE-2021-42023.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42023", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42024.json b/2021/42xxx/CVE-2021-42024.json new file mode 100644 index 00000000000..40061a68a6e --- /dev/null +++ b/2021/42xxx/CVE-2021-42024.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42024", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42025.json b/2021/42xxx/CVE-2021-42025.json new file mode 100644 index 00000000000..aeb854ee863 --- /dev/null +++ b/2021/42xxx/CVE-2021-42025.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42025", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42026.json b/2021/42xxx/CVE-2021-42026.json new file mode 100644 index 00000000000..850f8963a18 --- /dev/null +++ b/2021/42xxx/CVE-2021-42026.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42026", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42027.json b/2021/42xxx/CVE-2021-42027.json new file mode 100644 index 00000000000..b9ba14748c4 --- /dev/null +++ b/2021/42xxx/CVE-2021-42027.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42027", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42028.json b/2021/42xxx/CVE-2021-42028.json new file mode 100644 index 00000000000..ec1c83c0969 --- /dev/null +++ b/2021/42xxx/CVE-2021-42028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42029.json b/2021/42xxx/CVE-2021-42029.json new file mode 100644 index 00000000000..f8339bc8eaf --- /dev/null +++ b/2021/42xxx/CVE-2021-42029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42030.json b/2021/42xxx/CVE-2021-42030.json new file mode 100644 index 00000000000..b5861352f48 --- /dev/null +++ b/2021/42xxx/CVE-2021-42030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42031.json b/2021/42xxx/CVE-2021-42031.json new file mode 100644 index 00000000000..f696c1ad4ac --- /dev/null +++ b/2021/42xxx/CVE-2021-42031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42032.json b/2021/42xxx/CVE-2021-42032.json new file mode 100644 index 00000000000..710e67c60e7 --- /dev/null +++ b/2021/42xxx/CVE-2021-42032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42033.json b/2021/42xxx/CVE-2021-42033.json new file mode 100644 index 00000000000..0250a0136e3 --- /dev/null +++ b/2021/42xxx/CVE-2021-42033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42034.json b/2021/42xxx/CVE-2021-42034.json new file mode 100644 index 00000000000..0fc3c286e63 --- /dev/null +++ b/2021/42xxx/CVE-2021-42034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42035.json b/2021/42xxx/CVE-2021-42035.json new file mode 100644 index 00000000000..ad6e7893479 --- /dev/null +++ b/2021/42xxx/CVE-2021-42035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42036.json b/2021/42xxx/CVE-2021-42036.json new file mode 100644 index 00000000000..d8a5e7ef839 --- /dev/null +++ b/2021/42xxx/CVE-2021-42036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42037.json b/2021/42xxx/CVE-2021-42037.json new file mode 100644 index 00000000000..d151f24d07d --- /dev/null +++ b/2021/42xxx/CVE-2021-42037.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42037", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42038.json b/2021/42xxx/CVE-2021-42038.json new file mode 100644 index 00000000000..56d6c7dbcfe --- /dev/null +++ b/2021/42xxx/CVE-2021-42038.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42038", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42039.json b/2021/42xxx/CVE-2021-42039.json new file mode 100644 index 00000000000..0fbc205ef05 --- /dev/null +++ b/2021/42xxx/CVE-2021-42039.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42039", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42040.json b/2021/42xxx/CVE-2021-42040.json new file mode 100644 index 00000000000..8333ef5736c --- /dev/null +++ b/2021/42xxx/CVE-2021-42040.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42040", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in MediaWiki through 1.36.2. A parser function related to loop control allowed for an infinite loop (and php-fpm hang) within the Loops extension because egLoopsCountLimit is mishandled. This could lead to memory exhaustion." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T287347", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T287347" + }, + { + "url": "https://gerrit.wikimedia.org/r/q/I0caf6f129f94612b5bcf406a171aa5ffedea1f80", + "refsource": "MISC", + "name": "https://gerrit.wikimedia.org/r/q/I0caf6f129f94612b5bcf406a171aa5ffedea1f80" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42041.json b/2021/42xxx/CVE-2021-42041.json new file mode 100644 index 00000000000..d9524358821 --- /dev/null +++ b/2021/42xxx/CVE-2021-42041.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42041", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in CentralAuth in MediaWiki through 1.36.2. The rightsnone MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the setchange log." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T291696", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T291696" + }, + { + "url": "https://gerrit.wikimedia.org/r/q/I7aeaa6e4de5ccaa5eeb6bf4fb00c96b01d5fea35", + "refsource": "MISC", + "name": "https://gerrit.wikimedia.org/r/q/I7aeaa6e4de5ccaa5eeb6bf4fb00c96b01d5fea35" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42042.json b/2021/42xxx/CVE-2021-42042.json new file mode 100644 index 00000000000..c4b444abe6f --- /dev/null +++ b/2021/42xxx/CVE-2021-42042.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42042", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in SpecialEditGrowthConfig in the GrowthExperiments extension in MediaWiki through 1.36.2. The growthexperiments-edit-config-error-invalid-title MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T290692", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T290692" + }, + { + "url": "https://gerrit.wikimedia.org/r/q/Ibeb13d032ca044af53f6b2334e27b6b97b6f4e9f", + "refsource": "MISC", + "name": "https://gerrit.wikimedia.org/r/q/Ibeb13d032ca044af53f6b2334e27b6b97b6f4e9f" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42043.json b/2021/42xxx/CVE-2021-42043.json new file mode 100644 index 00000000000..4abc5c3cfc7 --- /dev/null +++ b/2021/42xxx/CVE-2021-42043.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42043", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Special:MediaSearch in the MediaSearch extension in MediaWiki through 1.36.2. The suggestion text (a parameter to mediasearch-did-you-mean) was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the intitle: search operator within the query." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T291600", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T291600" + }, + { + "url": "https://gerrit.wikimedia.org/r/q/If64eb5842237c92290d07ebc3fe14710d9de3fc2", + "refsource": "MISC", + "name": "https://gerrit.wikimedia.org/r/q/If64eb5842237c92290d07ebc3fe14710d9de3fc2" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42044.json b/2021/42xxx/CVE-2021-42044.json new file mode 100644 index 00000000000..d6f454f828a --- /dev/null +++ b/2021/42xxx/CVE-2021-42044.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42044", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Mentor dashboard in the GrowthExperiments extension in MediaWiki through 1.36.2. The Growthexperiments-mentor-dashboard-mentee-overview-add-filter-total-edits-headline, growthexperiments-mentor-dashboard-mentee-overview-add-filter-starred-headline, growthexperiments-mentor-dashboard-mentee-overview-info-text, growthexperiments-mentor-dashboard-mentee-overview-info-legend-headline, and growthexperiments-mentor-dashboard-mentee-overview-active-ago MediaWiki messages were not being properly sanitized and allowed for the injection and execution of HTML and JavaScript." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T289408", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T289408" + }, + { + "url": "https://gerrit.wikimedia.org/r/q/I858d55fb2eca9b50ac6ef5a6f2a7b2784f0fa0d6", + "refsource": "MISC", + "name": "https://gerrit.wikimedia.org/r/q/I858d55fb2eca9b50ac6ef5a6f2a7b2784f0fa0d6" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42045.json b/2021/42xxx/CVE-2021-42045.json new file mode 100644 index 00000000000..e7c273120f7 --- /dev/null +++ b/2021/42xxx/CVE-2021-42045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42046.json b/2021/42xxx/CVE-2021-42046.json new file mode 100644 index 00000000000..b326ec41fa8 --- /dev/null +++ b/2021/42xxx/CVE-2021-42046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42047.json b/2021/42xxx/CVE-2021-42047.json new file mode 100644 index 00000000000..d1889fb0a4b --- /dev/null +++ b/2021/42xxx/CVE-2021-42047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42048.json b/2021/42xxx/CVE-2021-42048.json new file mode 100644 index 00000000000..e8c796af5c8 --- /dev/null +++ b/2021/42xxx/CVE-2021-42048.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42048", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42049.json b/2021/42xxx/CVE-2021-42049.json new file mode 100644 index 00000000000..06c6b744fb3 --- /dev/null +++ b/2021/42xxx/CVE-2021-42049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42050.json b/2021/42xxx/CVE-2021-42050.json new file mode 100644 index 00000000000..01779f535a2 --- /dev/null +++ b/2021/42xxx/CVE-2021-42050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42051.json b/2021/42xxx/CVE-2021-42051.json new file mode 100644 index 00000000000..6e59fbe15ce --- /dev/null +++ b/2021/42xxx/CVE-2021-42051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42052.json b/2021/42xxx/CVE-2021-42052.json new file mode 100644 index 00000000000..1e0f4bb4431 --- /dev/null +++ b/2021/42xxx/CVE-2021-42052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42053.json b/2021/42xxx/CVE-2021-42053.json new file mode 100644 index 00000000000..4e8ab9d1221 --- /dev/null +++ b/2021/42xxx/CVE-2021-42053.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42053", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Unicorn framework through 0.35.3 for Django allows XSS via component.name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/adamghill/django-unicorn/pull/288/files", + "refsource": "MISC", + "name": "https://github.com/adamghill/django-unicorn/pull/288/files" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42054.json b/2021/42xxx/CVE-2021-42054.json new file mode 100644 index 00000000000..3d0b4f9fad3 --- /dev/null +++ b/2021/42xxx/CVE-2021-42054.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42054", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/xebd/accel-ppp/issues/156", + "refsource": "MISC", + "name": "https://github.com/xebd/accel-ppp/issues/156" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42055.json b/2021/42xxx/CVE-2021-42055.json new file mode 100644 index 00000000000..aafbc84d729 --- /dev/null +++ b/2021/42xxx/CVE-2021-42055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42056.json b/2021/42xxx/CVE-2021-42056.json new file mode 100644 index 00000000000..9b53347e27b --- /dev/null +++ b/2021/42xxx/CVE-2021-42056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42057.json b/2021/42xxx/CVE-2021-42057.json new file mode 100644 index 00000000000..a4883e86056 --- /dev/null +++ b/2021/42xxx/CVE-2021-42057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42058.json b/2021/42xxx/CVE-2021-42058.json new file mode 100644 index 00000000000..6e348848985 --- /dev/null +++ b/2021/42xxx/CVE-2021-42058.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42058", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42059.json b/2021/42xxx/CVE-2021-42059.json new file mode 100644 index 00000000000..10411dbe20d --- /dev/null +++ b/2021/42xxx/CVE-2021-42059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42060.json b/2021/42xxx/CVE-2021-42060.json new file mode 100644 index 00000000000..fd4709da2a6 --- /dev/null +++ b/2021/42xxx/CVE-2021-42060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42061.json b/2021/42xxx/CVE-2021-42061.json new file mode 100644 index 00000000000..7b052d5f966 --- /dev/null +++ b/2021/42xxx/CVE-2021-42061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42062.json b/2021/42xxx/CVE-2021-42062.json new file mode 100644 index 00000000000..b99c137b9c0 --- /dev/null +++ b/2021/42xxx/CVE-2021-42062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42063.json b/2021/42xxx/CVE-2021-42063.json new file mode 100644 index 00000000000..852ff131f4b --- /dev/null +++ b/2021/42xxx/CVE-2021-42063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42064.json b/2021/42xxx/CVE-2021-42064.json new file mode 100644 index 00000000000..3f04279e4b3 --- /dev/null +++ b/2021/42xxx/CVE-2021-42064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42065.json b/2021/42xxx/CVE-2021-42065.json new file mode 100644 index 00000000000..c16bc78be92 --- /dev/null +++ b/2021/42xxx/CVE-2021-42065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42066.json b/2021/42xxx/CVE-2021-42066.json new file mode 100644 index 00000000000..5438f1d3285 --- /dev/null +++ b/2021/42xxx/CVE-2021-42066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42067.json b/2021/42xxx/CVE-2021-42067.json new file mode 100644 index 00000000000..2c9de6a2a02 --- /dev/null +++ b/2021/42xxx/CVE-2021-42067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42068.json b/2021/42xxx/CVE-2021-42068.json new file mode 100644 index 00000000000..252fdbcb697 --- /dev/null +++ b/2021/42xxx/CVE-2021-42068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42069.json b/2021/42xxx/CVE-2021-42069.json new file mode 100644 index 00000000000..b46b66d451e --- /dev/null +++ b/2021/42xxx/CVE-2021-42069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42070.json b/2021/42xxx/CVE-2021-42070.json new file mode 100644 index 00000000000..ddc812b8e81 --- /dev/null +++ b/2021/42xxx/CVE-2021-42070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42071.json b/2021/42xxx/CVE-2021-42071.json new file mode 100644 index 00000000000..5a6854e4408 --- /dev/null +++ b/2021/42xxx/CVE-2021-42071.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42071", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py Uaer-Agent HTTP header." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/50098", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50098" + }, + { + "url": "https://visual-tools.com/", + "refsource": "MISC", + "name": "https://visual-tools.com/" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42072.json b/2021/42xxx/CVE-2021-42072.json new file mode 100644 index 00000000000..f608dfe5478 --- /dev/null +++ b/2021/42xxx/CVE-2021-42072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42073.json b/2021/42xxx/CVE-2021-42073.json new file mode 100644 index 00000000000..f2799bade23 --- /dev/null +++ b/2021/42xxx/CVE-2021-42073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42074.json b/2021/42xxx/CVE-2021-42074.json new file mode 100644 index 00000000000..4fc313e0a28 --- /dev/null +++ b/2021/42xxx/CVE-2021-42074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42075.json b/2021/42xxx/CVE-2021-42075.json new file mode 100644 index 00000000000..144926e83f8 --- /dev/null +++ b/2021/42xxx/CVE-2021-42075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42076.json b/2021/42xxx/CVE-2021-42076.json new file mode 100644 index 00000000000..ba6465e3da3 --- /dev/null +++ b/2021/42xxx/CVE-2021-42076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42077.json b/2021/42xxx/CVE-2021-42077.json new file mode 100644 index 00000000000..15d8033084c --- /dev/null +++ b/2021/42xxx/CVE-2021-42077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42078.json b/2021/42xxx/CVE-2021-42078.json new file mode 100644 index 00000000000..531f90b269b --- /dev/null +++ b/2021/42xxx/CVE-2021-42078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42079.json b/2021/42xxx/CVE-2021-42079.json new file mode 100644 index 00000000000..97e068f9027 --- /dev/null +++ b/2021/42xxx/CVE-2021-42079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42080.json b/2021/42xxx/CVE-2021-42080.json new file mode 100644 index 00000000000..aa01440bb85 --- /dev/null +++ b/2021/42xxx/CVE-2021-42080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42081.json b/2021/42xxx/CVE-2021-42081.json new file mode 100644 index 00000000000..9a0464f4d43 --- /dev/null +++ b/2021/42xxx/CVE-2021-42081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42082.json b/2021/42xxx/CVE-2021-42082.json new file mode 100644 index 00000000000..2b5998761c0 --- /dev/null +++ b/2021/42xxx/CVE-2021-42082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42083.json b/2021/42xxx/CVE-2021-42083.json new file mode 100644 index 00000000000..9bb9b483bcd --- /dev/null +++ b/2021/42xxx/CVE-2021-42083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42084.json b/2021/42xxx/CVE-2021-42084.json new file mode 100644 index 00000000000..646f26e9d97 --- /dev/null +++ b/2021/42xxx/CVE-2021-42084.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42084", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. An attacker with valid agent credentials may send a series of crafted requests that cause an endless loop and thus cause denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-11", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-11" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42085.json b/2021/42xxx/CVE-2021-42085.json new file mode 100644 index 00000000000..9e322615e6f --- /dev/null +++ b/2021/42xxx/CVE-2021-42085.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42085", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. There is stored XSS via a custom Avatar." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-17", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-17" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42086.json b/2021/42xxx/CVE-2021-42086.json new file mode 100644 index 00000000000..cfdcd772471 --- /dev/null +++ b/2021/42xxx/CVE-2021-42086.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42086", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. An Agent account can modify account data, and gain admin access, via a crafted request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-09", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-09" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42087.json b/2021/42xxx/CVE-2021-42087.json new file mode 100644 index 00000000000..87881d1e27e --- /dev/null +++ b/2021/42xxx/CVE-2021-42087.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42087", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. An admin can discover the application secret via the API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-15", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-15" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42088.json b/2021/42xxx/CVE-2021-42088.json new file mode 100644 index 00000000000..00311a7b6cf --- /dev/null +++ b/2021/42xxx/CVE-2021-42088.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42088", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. The Chat functionality allows XSS because clipboard data is mishandled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-12", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-12" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42089.json b/2021/42xxx/CVE-2021-42089.json new file mode 100644 index 00000000000..0e75e5bae4c --- /dev/null +++ b/2021/42xxx/CVE-2021-42089.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42089", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. The REST API discloses sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-13", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-13" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42090.json b/2021/42xxx/CVE-2021-42090.json new file mode 100644 index 00000000000..f854b9bbbf3 --- /dev/null +++ b/2021/42xxx/CVE-2021-42090.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42090", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. The Form functionality allows remote code execution because deserialization is mishandled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-14", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-14" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42091.json b/2021/42xxx/CVE-2021-42091.json new file mode 100644 index 00000000000..9bcb014883b --- /dev/null +++ b/2021/42xxx/CVE-2021-42091.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42091", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. SSRF can occur via GitHub or GitLab integration." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-08", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-08" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42092.json b/2021/42xxx/CVE-2021-42092.json new file mode 100644 index 00000000000..4c6bfbf0865 --- /dev/null +++ b/2021/42xxx/CVE-2021-42092.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42092", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. Stored XSS may occur via an Article during addition of an attachment to a Ticket." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-16", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-16" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42093.json b/2021/42xxx/CVE-2021-42093.json new file mode 100644 index 00000000000..7503a198d13 --- /dev/null +++ b/2021/42xxx/CVE-2021-42093.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42093", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. An admin can execute code on the server via a crafted request that manipulates triggers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-10", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-10" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42094.json b/2021/42xxx/CVE-2021-42094.json new file mode 100644 index 00000000000..4daf44e80f9 --- /dev/null +++ b/2021/42xxx/CVE-2021-42094.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42094", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. Command Injection can occur via custom Packages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-18", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-18" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42095.json b/2021/42xxx/CVE-2021-42095.json new file mode 100644 index 00000000000..e242f37b417 --- /dev/null +++ b/2021/42xxx/CVE-2021-42095.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42095", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Xshell before 7.0.0.76 allows attackers to cause a crash by triggering rapid changes to the title bar." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netsarang.com/en/xshell-update-history/", + "refsource": "MISC", + "name": "https://www.netsarang.com/en/xshell-update-history/" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42096.json b/2021/42xxx/CVE-2021-42096.json new file mode 100644 index 00000000000..ab9fd903a31 --- /dev/null +++ b/2021/42xxx/CVE-2021-42096.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42096", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42097.json b/2021/42xxx/CVE-2021-42097.json new file mode 100644 index 00000000000..94aa0b3f803 --- /dev/null +++ b/2021/42xxx/CVE-2021-42097.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42097", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42098.json b/2021/42xxx/CVE-2021-42098.json new file mode 100644 index 00000000000..f1e2e3da5f2 --- /dev/null +++ b/2021/42xxx/CVE-2021-42098.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42098", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42099.json b/2021/42xxx/CVE-2021-42099.json new file mode 100644 index 00000000000..245dd6b484f --- /dev/null +++ b/2021/42xxx/CVE-2021-42099.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42099", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42100.json b/2021/42xxx/CVE-2021-42100.json new file mode 100644 index 00000000000..9fc2c16427f --- /dev/null +++ b/2021/42xxx/CVE-2021-42100.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42100", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20002.json b/2022/20xxx/CVE-2022-20002.json new file mode 100644 index 00000000000..a74b74f3acb --- /dev/null +++ b/2022/20xxx/CVE-2022-20002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20003.json b/2022/20xxx/CVE-2022-20003.json new file mode 100644 index 00000000000..95910693553 --- /dev/null +++ b/2022/20xxx/CVE-2022-20003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20004.json b/2022/20xxx/CVE-2022-20004.json new file mode 100644 index 00000000000..d026aa52127 --- /dev/null +++ b/2022/20xxx/CVE-2022-20004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20005.json b/2022/20xxx/CVE-2022-20005.json new file mode 100644 index 00000000000..2d02981fffe --- /dev/null +++ b/2022/20xxx/CVE-2022-20005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20006.json b/2022/20xxx/CVE-2022-20006.json new file mode 100644 index 00000000000..230b8664e60 --- /dev/null +++ b/2022/20xxx/CVE-2022-20006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20007.json b/2022/20xxx/CVE-2022-20007.json new file mode 100644 index 00000000000..9e8f77916d2 --- /dev/null +++ b/2022/20xxx/CVE-2022-20007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20008.json b/2022/20xxx/CVE-2022-20008.json new file mode 100644 index 00000000000..28daadf350b --- /dev/null +++ b/2022/20xxx/CVE-2022-20008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20009.json b/2022/20xxx/CVE-2022-20009.json new file mode 100644 index 00000000000..9ddb8b9c807 --- /dev/null +++ b/2022/20xxx/CVE-2022-20009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20010.json b/2022/20xxx/CVE-2022-20010.json new file mode 100644 index 00000000000..0c0849e779a --- /dev/null +++ b/2022/20xxx/CVE-2022-20010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/20xxx/CVE-2022-20011.json b/2022/20xxx/CVE-2022-20011.json new file mode 100644 index 00000000000..317a580ba29 --- /dev/null +++ b/2022/20xxx/CVE-2022-20011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-20011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file