diff --git a/2016/2xxx/CVE-2016-2568.json b/2016/2xxx/CVE-2016-2568.json index bc0199c176d..8d234ee179d 100644 --- a/2016/2xxx/CVE-2016-2568.json +++ b/2016/2xxx/CVE-2016-2568.json @@ -61,6 +61,21 @@ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1300746", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300746" + }, + { + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/cve-2016-2568", + "url": "https://access.redhat.com/security/cve/cve-2016-2568" + }, + { + "refsource": "MISC", + "name": "https://ubuntu.com/security/CVE-2016-2568", + "url": "https://ubuntu.com/security/CVE-2016-2568" + }, + { + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062", + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062" } ] } diff --git a/2018/16xxx/CVE-2018-16177.json b/2018/16xxx/CVE-2018-16177.json index 063f71c6b26..e19a768545d 100644 --- a/2018/16xxx/CVE-2018-16177.json +++ b/2018/16xxx/CVE-2018-16177.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Untrusted search path vulnerability in The installer of Windows10 Fall Creators Update Modify module for Security Measures tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." + "value": "Untrusted search path vulnerability in The installer of Windows 10 Fall Creators Update Modify module for Security Measures tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." } ] }, diff --git a/2020/4xxx/CVE-2020-4944.json b/2020/4xxx/CVE-2020-4944.json index c4cab734e60..54a5fbcc5e5 100644 --- a/2020/4xxx/CVE-2020-4944.json +++ b/2020/4xxx/CVE-2020-4944.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "IBM UrbanCode Deploy (UCD) 7.0.3.0, 7.0.4.0, 7.0.5.3, 7.0.5.4, 7.1.0.0, 7.1.1.0, 7.1.1.1, and 7.1.1.2, stores keystore passwords in plain in plain text after a manuel edit, which can be read by a local user. IBM X-Force ID: 191944." + "value": "IBM UrbanCode Deploy (UCD) 7.0.3.0, 7.0.4.0, 7.0.5.3, 7.0.5.4, 7.1.0.0, 7.1.1.0, 7.1.1.1, and 7.1.1.2, stores keystore passwords in plain text after a manual edit, which can be read by a local user. IBM X-Force ID: 191944." } ] }, diff --git a/2021/33xxx/CVE-2021-33923.json b/2021/33xxx/CVE-2021-33923.json index 3d273e59b67..07618d33aeb 100644 --- a/2021/33xxx/CVE-2021-33923.json +++ b/2021/33xxx/CVE-2021-33923.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33923", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33923", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insecure permissions in Confluent Ansible (cp-ansible) 5.5.0, 5.5.1, 5.5.2 and 6.0.0 allows local attackers to access some sensitive information (private keys, state database)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://confluent.com", + "refsource": "MISC", + "name": "http://confluent.com" + }, + { + "refsource": "MISC", + "name": "https://www.detack.de/en/cve-2021-33923", + "url": "https://www.detack.de/en/cve-2021-33923" } ] } diff --git a/2021/33xxx/CVE-2021-33924.json b/2021/33xxx/CVE-2021-33924.json index c1274d72079..f6a587c44c0 100644 --- a/2021/33xxx/CVE-2021-33924.json +++ b/2021/33xxx/CVE-2021-33924.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33924", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33924", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Confluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://confluent.com", + "refsource": "MISC", + "name": "http://confluent.com" + }, + { + "refsource": "MISC", + "name": "https://www.detack.de/en/cve-2021-33924", + "url": "https://www.detack.de/en/cve-2021-33924" } ] }