From 73137431cbb69bc0c507272bd109584c1c222b73 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 24 Mar 2021 16:00:40 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/14xxx/CVE-2018-14009.json | 5 +++ 2019/19xxx/CVE-2019-19349.json | 55 +++++++++++++++++++++-- 2019/19xxx/CVE-2019-19350.json | 55 +++++++++++++++++++++-- 2020/13xxx/CVE-2020-13949.json | 20 +++++++++ 2020/35xxx/CVE-2020-35337.json | 61 ++++++++++++++++++++++--- 2020/36xxx/CVE-2020-36283.json | 81 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27208.json | 2 +- 2021/29xxx/CVE-2021-29135.json | 18 ++++++++ 2021/29xxx/CVE-2021-29136.json | 18 ++++++++ 9 files changed, 302 insertions(+), 13 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36283.json create mode 100644 2021/29xxx/CVE-2021-29135.json create mode 100644 2021/29xxx/CVE-2021-29136.json diff --git a/2018/14xxx/CVE-2018-14009.json b/2018/14xxx/CVE-2018-14009.json index d745d0aa4a5..da751d0bb80 100644 --- a/2018/14xxx/CVE-2018-14009.json +++ b/2018/14xxx/CVE-2018-14009.json @@ -61,6 +61,11 @@ "name": "https://github.com/Codiad/Codiad/issues/1078", "refsource": "MISC", "url": "https://github.com/Codiad/Codiad/issues/1078" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161944/Codiad-2.8.4-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/161944/Codiad-2.8.4-Remote-Code-Execution.html" } ] } diff --git a/2019/19xxx/CVE-2019-19349.json b/2019/19xxx/CVE-2019-19349.json index d5b2fc8634c..81759decb9c 100644 --- a/2019/19xxx/CVE-2019-19349.json +++ b/2019/19xxx/CVE-2019-19349.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-19349", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "operator-framework/operator-metering", + "version": { + "version_data": [ + { + "version_value": "as shipped in Red Hat Openshift 4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-266" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793284", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793284" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An insecure modification vulnerability in the /etc/passwd file was found in the container operator-framework/operator-metering as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges." } ] } diff --git a/2019/19xxx/CVE-2019-19350.json b/2019/19xxx/CVE-2019-19350.json index 8dfa1f385cd..be7fda55b07 100644 --- a/2019/19xxx/CVE-2019-19350.json +++ b/2019/19xxx/CVE-2019-19350.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-19350", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "openshift/ansible-service-broker", + "version": { + "version_data": [ + { + "version_value": "as shipped in Red Hat Openshift 4 and 3.11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-266" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793283", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793283" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ansible-service-broker as shipped in Red Hat Openshift 4 and 3.11. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges." } ] } diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 0741a77d23b..304c2525fec 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -278,6 +278,26 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)", "url": "https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)", + "url": "https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)", + "url": "https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)", + "url": "https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)", + "url": "https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/35xxx/CVE-2020-35337.json b/2020/35xxx/CVE-2020-35337.json index 29466df2ed0..4880118f994 100644 --- a/2020/35xxx/CVE-2020-35337.json +++ b/2020/35xxx/CVE-2020-35337.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35337", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35337", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ThinkSAAS before 3.38 contains a SQL injection vulnerability through app/topic/action/admin/topic.php via the title parameter, which allows remote attackers to execute arbitrary SQL commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/thinksaas/ThinkSAAS/issues/24", + "refsource": "MISC", + "name": "https://github.com/thinksaas/ThinkSAAS/issues/24" + }, + { + "url": "https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html", + "refsource": "MISC", + "name": "https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html" } ] } diff --git a/2020/36xxx/CVE-2020-36283.json b/2020/36xxx/CVE-2020-36283.json new file mode 100644 index 00000000000..1c617b1811d --- /dev/null +++ b/2020/36xxx/CVE-2020-36283.json @@ -0,0 +1,81 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36283", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198443", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198443" + }, + { + "url": "https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf", + "refsource": "MISC", + "name": "https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:R", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27208.json b/2021/27xxx/CVE-2021-27208.json index f36b7c96d92..4dd12e7bc74 100644 --- a/2021/27xxx/CVE-2021-27208.json +++ b/2021/27xxx/CVE-2021-27208.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand\u2019s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification to the Zynq-7000 device is needed to replace the original nand flash memory with a nand flash emulator for this attack to be successful." + "value": "When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand\u2019s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification of the board assembly on which the Zynq-7000 SoC device mounted is needed to replace the original NAND flash memory with a NAND flash emulation device for this attack to be successful." } ] }, diff --git a/2021/29xxx/CVE-2021-29135.json b/2021/29xxx/CVE-2021-29135.json new file mode 100644 index 00000000000..8f40cadfd3c --- /dev/null +++ b/2021/29xxx/CVE-2021-29135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-29135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29136.json b/2021/29xxx/CVE-2021-29136.json new file mode 100644 index 00000000000..e3129549e28 --- /dev/null +++ b/2021/29xxx/CVE-2021-29136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-29136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file