diff --git a/2020/12xxx/CVE-2020-12891.json b/2020/12xxx/CVE-2020-12891.json index 6a618d2bd06..f6aedc6b9f1 100644 --- a/2020/12xxx/CVE-2020-12891.json +++ b/2020/12xxx/CVE-2020-12891.json @@ -1,18 +1,84 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@amd.com", + "DATE_PUBLIC": "2021-11-09T20:30:00.000Z", "ID": "CVE-2020-12891", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Radeon Software", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Radeon Driver", + "version_value": " 21.4.1" + } + ] + } + }, + { + "product_name": "Radeon Pro Software for Enterprise", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": " Enterprise Driver", + "version_value": "21.Q2 " + } + ] + } + } + ] + }, + "vendor_name": "AMD" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "TBD" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", + "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000" + } + ] + }, + "source": { + "advisory": "AMD-SB-1000", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12965.json b/2020/12xxx/CVE-2020-12965.json index 979cb012bfe..9c1bc38d5e3 100644 --- a/2020/12xxx/CVE-2020-12965.json +++ b/2020/12xxx/CVE-2020-12965.json @@ -1,18 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@amd.com", + "DATE_PUBLIC": "2021-08-10T19:30:00.000Z", "ID": "CVE-2020-12965", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "All supported processors", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": " " + } + ] + } + } + ] + }, + "vendor_name": "AMD" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "TBD" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010", + "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010" + } + ] + }, + "source": { + "advisory": "AMD-SB-1010", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12966.json b/2020/12xxx/CVE-2020-12966.json index fdb92649571..65354b24a3d 100644 --- a/2020/12xxx/CVE-2020-12966.json +++ b/2020/12xxx/CVE-2020-12966.json @@ -1,18 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@amd.com", + "DATE_PUBLIC": "2021-08-10T19:30:00.000Z", "ID": "CVE-2020-12966", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": " " + } + ] + } + } + ] + }, + "vendor_name": "AMD" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "TBD" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013", + "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" + } + ] + }, + "source": { + "advisory": "AMD-SB-1013", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7534.json b/2020/7xxx/CVE-2020-7534.json index a26397fee4b..13612754ac1 100644 --- a/2020/7xxx/CVE-2020-7534.json +++ b/2020/7xxx/CVE-2020-7534.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-7534", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Modicon M340 CPUs: BMXP34 (All Versions), Modicon Quantum CPUs with integrated Ethernet (Copro): 140CPU65 (All Versions), Modicon Premium CPUs with integrated Ethernet (Copro): TSXP57 (All Versions), Modicon M340 ethernet modules: (BMXNOC0401, BMXNOE01, BMXNOR0200H) (All Versions), Modicon Quantum and Premium factory cast communication modules: (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103)", + "version": { + "version_data": [ + { + "version_value": "Modicon M340 CPUs: BMXP34 (All Versions), Modicon Quantum CPUs with integrated Ethernet (Copro): 140CPU65 (All Versions), Modicon Premium CPUs with integrated Ethernet (Copro): TSXP57 (All Versions), Modicon M340 ethernet modules: (BMXNOC0401, BMXNOE01, BMXNOR0200H) (All Versions), Modicon Quantum and Premium factory cast communication modules: (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103) (All Versions)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-01", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists on the web server used, that could cause a leak of sensitive data or unauthorized actions on the web server during the time the user is logged in. Affected Products: Modicon M340 CPUs: BMXP34 (All Versions), Modicon Quantum CPUs with integrated Ethernet (Copro): 140CPU65 (All Versions), Modicon Premium CPUs with integrated Ethernet (Copro): TSXP57 (All Versions), Modicon M340 ethernet modules: (BMXNOC0401, BMXNOE01, BMXNOR0200H) (All Versions), Modicon Quantum and Premium factory cast communication modules: (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103) (All Versions)" } ] } diff --git a/2021/21xxx/CVE-2021-21959.json b/2021/21xxx/CVE-2021-21959.json index 8ce8f6065b6..668392e13c4 100644 --- a/2021/21xxx/CVE-2021-21959.json +++ b/2021/21xxx/CVE-2021-21959.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21959", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Certificate Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1388", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1388" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A misconfiguration exists in the MQTTS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. This misconfiguration significantly simplifies a man-in-the-middle attack, which directly leads to control of device functionality." } ] } diff --git a/2021/21xxx/CVE-2021-21960.json b/2021/21xxx/CVE-2021-21960.json index 042f29f6451..0987c103a17 100644 --- a/2021/21xxx/CVE-2021-21960.json +++ b/2021/21xxx/CVE-2021-21960.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21960", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "stack-based buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack-based buffer overflow vulnerability exists in both the LLMNR functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted network packet can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability." } ] } diff --git a/2021/21xxx/CVE-2021-21961.json b/2021/21xxx/CVE-2021-21961.json index 519fd0f8e31..4da14fa3f1d 100644 --- a/2021/21xxx/CVE-2021-21961.json +++ b/2021/21xxx/CVE-2021-21961.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21961", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "stack-based buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack-based buffer overflow vulnerability exists in the NBNS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted network packet can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability." } ] } diff --git a/2021/21xxx/CVE-2021-21962.json b/2021/21xxx/CVE-2021-21962.json index 8d09812ccb5..6052313e56e 100644 --- a/2021/21xxx/CVE-2021-21962.json +++ b/2021/21xxx/CVE-2021-21962.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21962", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "heap based buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1390", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1390" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap-based buffer overflow vulnerability exists in the OTA Update u-download functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A series of specially-crafted MQTT payloads can lead to remote code execution. An attacker must perform a man-in-the-middle attack in order to trigger this vulnerability." } ] } diff --git a/2021/21xxx/CVE-2021-21963.json b/2021/21xxx/CVE-2021-21963.json index 4a16d065731..c3b9388cb49 100644 --- a/2021/21xxx/CVE-2021-21963.json +++ b/2021/21xxx/CVE-2021-21963.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21963", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1391", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1391" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An information disclosure vulnerability exists in the Web Server functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability." } ] } diff --git a/2021/21xxx/CVE-2021-21964.json b/2021/21xxx/CVE-2021-21964.json index 3105d0d23cd..49be52b7ed4 100644 --- a/2021/21xxx/CVE-2021-21964.json +++ b/2021/21xxx/CVE-2021-21964.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21964", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A denial of service vulnerability exists in the Modbus configuration functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. Specially-crafted network packets can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability." } ] } diff --git a/2021/21xxx/CVE-2021-21965.json b/2021/21xxx/CVE-2021-21965.json index 067622faf9e..e99a29fe045 100644 --- a/2021/21xxx/CVE-2021-21965.json +++ b/2021/21xxx/CVE-2021-21965.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21965", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A denial of service vulnerability exists in the SeaMax remote configuration functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. Specially-crafted network packets can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability." } ] } diff --git a/2021/21xxx/CVE-2021-21968.json b/2021/21xxx/CVE-2021-21968.json index 6cc33444288..d4dc2764289 100644 --- a/2021/21xxx/CVE-2021-21968.json +++ b/2021/21xxx/CVE-2021-21968.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21968", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1395", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1395" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A file write vulnerability exists in the OTA update task functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to arbitrary file overwrite. An attacker can perform a man-in-the-middle attack to trigger this vulnerability." } ] } diff --git a/2021/21xxx/CVE-2021-21969.json b/2021/21xxx/CVE-2021-21969.json index e79b249fba5..edfe3fd19ba 100644 --- a/2021/21xxx/CVE-2021-21969.json +++ b/2021/21xxx/CVE-2021-21969.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21969", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel\"", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "out of bounds write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds write vulnerability exists in the HandleSeaCloudMessage functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. The HandleIncomingSeaCloudMessage function uses at [4] the json_object_get_string to populate the p_payload global variable. The p_payload is only 0x100 bytes long, and the total MQTT message could be up to 0x201 bytes. Because the function json_object_get_string will fill str based on the length of the json\u2019s value and not the actual str size, this would result in a possible out-of-bounds write." } ] } diff --git a/2021/21xxx/CVE-2021-21970.json b/2021/21xxx/CVE-2021-21970.json index 70beb59ce12..eee5ddeaae6 100644 --- a/2021/21xxx/CVE-2021-21970.json +++ b/2021/21xxx/CVE-2021-21970.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21970", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "out of bounds write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds write vulnerability exists in the HandleSeaCloudMessage functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. The HandleIncomingSeaCloudMessage function uses at [3] the json_object_get_string to populate the p_name global variable. The p_name is only 0x80 bytes long, and the total MQTT message could be up to 0x201 bytes. Because the function json_object_get_string will fill str based on the length of the json\u2019s value and not the actual str size, this would result in a possible out-of-bounds write." } ] } diff --git a/2021/21xxx/CVE-2021-21971.json b/2021/21xxx/CVE-2021-21971.json index 8ed78db262a..6a9e1e9d0e4 100644 --- a/2021/21xxx/CVE-2021-21971.json +++ b/2021/21xxx/CVE-2021-21971.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21971", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sealevel", + "version": { + "version_data": [ + { + "version_value": "Sealevel Systems, Inc. SeaConnect 370W v1.3.34" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "out of bounds write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1406", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1406" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds write vulnerability exists in the URL_decode functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to an out-of-bounds write. An attacker can perform a man-in-the-middle attack to trigger this vulnerability." } ] } diff --git a/2021/22xxx/CVE-2021-22284.json b/2021/22xxx/CVE-2021-22284.json index 85837aa279f..6382aebd71d 100644 --- a/2021/22xxx/CVE-2021-22284.json +++ b/2021/22xxx/CVE-2021-22284.json @@ -1,18 +1,156 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cybersecurity@ch.abb.com", + "DATE_PUBLIC": "2022-01-24T11:58:00.000Z", "ID": "CVE-2021-22284", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SECURITY - OPC Server for AC 800M - Remote Code Execution Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "800xA, Control Software for AC 800M OPC Server for AC 800M", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "5.1.0-x" + }, + { + "version_affected": "<=", + "version_value": "5.1.1-x" + }, + { + "version_affected": "=", + "version_value": "6.0.0-1" + }, + { + "version_affected": "=", + "version_value": "6.0.0-2" + }, + { + "version_affected": "=", + "version_value": "6.0.0-3" + } + ] + } + }, + { + "product_name": "Control Builder Safe, version 1.x OPC Server for AC 800M", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "5.1.1-1" + } + ] + } + }, + { + "product_name": "Control Builder Safe, version 2.0 OPC Server for AC 800M", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.0.0-1" + } + ] + } + }, + { + "product_name": "Compact Product Suite - Control and I/O OPC Server for AC 800M", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "5.1.0-x" + }, + { + "version_affected": "<=", + "version_value": "5.1.1-x" + }, + { + "version_affected": "<=", + "version_value": "6.0.0-x" + } + ] + } + } + ] + }, + "vendor_name": "ABB" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "ABB thanks William Knowles at Applied Risk for helping to identify the vulnerabilities and protecting our customers." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-732 Incorrect Permission Assignment for Critical Resource" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908&LanguageCode=en&DocumentPartId=&Action=Launch", + "name": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908&LanguageCode=en&DocumentPartId=&Action=Launch" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Customers on version 5.1 or older are recommended to upgrade to a supported version that is not affected by this issue such as version 6.1 or later." + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22285.json b/2021/22xxx/CVE-2021-22285.json index 28711a4b999..28ca47916db 100644 --- a/2021/22xxx/CVE-2021-22285.json +++ b/2021/22xxx/CVE-2021-22285.json @@ -1,18 +1,118 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cybersecurity@ch.abb.com", + "DATE_PUBLIC": "2022-02-02T13:47:00.000Z", "ID": "CVE-2021-22285", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SECURITY \u2013 Denial of Service Vulnerabilities in SPIET800 INFI-Net to Ethernet Transfer module and PNI800 S+ Ethernet communication interface module" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SPIET800", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "A_B" + } + ] + } + }, + { + "product_name": "PNI800", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "A_B" + } + ] + } + } + ] + }, + "vendor_name": "ABB" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "ABB thanks Lance Lamont from Verve Industrial Protection and Ron Brash from Verve Industrial Protection/aDolus Technology Inc. helping to identify the vulnerabilities and protecting our customers." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Handling of Exceptional Conditions, Improper Check for Unusual or Exceptional Conditions vulnerability in the ABB SPIET800 and PNI800 module that allows an attacker to cause the denial of service or make the module unresponsive." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-755 Improper Handling of Exceptional Conditions" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-754 Improper Check for Unusual or Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA001353&LanguageCode=en&DocumentPartId=&Action=Launch", + "name": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA001353&LanguageCode=en&DocumentPartId=&Action=Launch" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "ABB advises all customers to review their installations to determine if they are using an impacted product as listed above.\n\u2013 SPIET800 devices with firmware version A_B or earlier are affected. All the vulnerabilities will be corrected in version A_C or later.\n\u2013 PNI800 devices with firmware version A_B or earlier are affected. All the vulnerabilities will be corrected in version B_0 or later." + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22286.json b/2021/22xxx/CVE-2021-22286.json index e9eab540eed..aae7f927197 100644 --- a/2021/22xxx/CVE-2021-22286.json +++ b/2021/22xxx/CVE-2021-22286.json @@ -1,18 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cybersecurity@ch.abb.com", + "DATE_PUBLIC": "2022-02-02T13:47:00.000Z", "ID": "CVE-2021-22286", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SECURITY \u2013 Denial of Service Vulnerabilities in SPIET800 INFI-Net to Ethernet Transfer module and PNI800 S+ Ethernet communication interface module" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SPIET800", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "A_B" + } + ] + } + }, + { + "product_name": "PNI800", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "A_B" + } + ] + } + } + ] + }, + "vendor_name": "ABB" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "ABB thanks Lance Lamont from Verve Industrial Protection and Ron Brash from Verve Industrial Protection/aDolus Technology Inc. helping to identify the vulnerabilities and protecting our customers." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to cause the denial of service or make the module unresponsive." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA001353&LanguageCode=en&DocumentPartId=&Action=Launch", + "name": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA001353&LanguageCode=en&DocumentPartId=&Action=Launch" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "ABB advises all customers to review their installations to determine if they are using an impacted product as listed above.\n\u2013 SPIET800 devices with firmware version A_B or earlier are affected. All the vulnerabilities will be corrected in version A_C or later.\n\u2013 PNI800 devices with firmware version A_B or earlier are affected. All the vulnerabilities will be corrected in version B_0 or later." + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22288.json b/2021/22xxx/CVE-2021-22288.json index eedc31257e4..c27c694c44c 100644 --- a/2021/22xxx/CVE-2021-22288.json +++ b/2021/22xxx/CVE-2021-22288.json @@ -1,18 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cybersecurity@ch.abb.com", + "DATE_PUBLIC": "2022-02-02T13:47:00.000Z", "ID": "CVE-2021-22288", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SECURITY \u2013 Denial of Service Vulnerabilities in SPIET800 INFI-Net to Ethernet Transfer module and PNI800 S+ Ethernet communication interface module" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SPIET800", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "A_B" + } + ] + } + }, + { + "product_name": "PNI800", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "A_B" + } + ] + } + } + ] + }, + "vendor_name": "ABB" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "ABB thanks Lance Lamont from Verve Industrial Protection and Ron Brash from Verve Industrial Protection/aDolus Technology Inc. helping to identify the vulnerabilities and protecting our customers." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to cause the denial of service or make the module unresponsive." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA001353&LanguageCode=en&DocumentPartId=&Action=Launch", + "name": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA001353&LanguageCode=en&DocumentPartId=&Action=Launch" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "ABB advises all customers to review their installations to determine if they are using an impacted product as listed above.\n\u2013 SPIET800 devices with firmware version A_B or earlier are affected. All the vulnerabilities will be corrected in version A_C or later.\n\u2013 PNI800 devices with firmware version A_B or earlier are affected. All the vulnerabilities will be corrected in version B_0 or later." + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28503.json b/2021/28xxx/CVE-2021-28503.json index c41a3fd2cda..1e1793a76e6 100644 --- a/2021/28xxx/CVE-2021-28503.json +++ b/2021/28xxx/CVE-2021-28503.json @@ -1,18 +1,119 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@arista.com", + "DATE_PUBLIC": "2022-02-02T17:00:00.000Z", "ID": "CVE-2021-28503", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "In Arista's EOS software affected releases, eAPI might skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI." }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Arista EOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "EOS-4.23", + "version_value": "EOS-4.23.10" + }, + { + "version_affected": "<", + "version_name": "EOS-4.24", + "version_value": "EOS-4.24.8" + }, + { + "version_affected": "<", + "version_name": "EOS-4.25", + "version_value": "EOS-4.25.6" + }, + { + "version_affected": "<", + "version_name": "EOS-4.26", + "version_value": "EOS-4.26.3" + } + ] + } + } + ] + }, + "vendor_name": "Arista Networks" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The impact of this vulnerability is that Arista's EOS eAPI may skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-305 Authentication Bypass by Primary Weakness" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/13605-security-advisory-0072", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/13605-security-advisory-0072" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience.\n\nThe vulnerability is fixed in the following EOS versions:\n 4.26.3 and later releases in the 4.26.x train\n 4.25.6 and later releases in the 4.25.x train\n 4.24.8 and later releases in the 4.24.x train\n 4.23.10 and later releases in the 4.24.x train" + } + ], + "source": { + "advisory": "Security Advisory 0072", + "defect": [ + "BUG606686" + ], + "discovery": "INTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Disallowing user certificate authentication via eAPI can be used to mitigate the vulnerability.\n\nswitch(config)#management security\nswitch(config-mgmt-security)#ssl profile profileEAPI\nswitch(config-mgmt-sec-ssl-profile-profileEAPI)#no trust certificate user.cert\nswitch(config-mgmt-sec-ssl-profile-profileEAPI)#exit" + } + ] } \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29218.json b/2021/29xxx/CVE-2021-29218.json index d705db742a2..9f28f75c3e9 100644 --- a/2021/29xxx/CVE-2021-29218.json +++ b/2021/29xxx/CVE-2021-29218.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-29218", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HPE Agentless Management", + "version": { + "version_data": [ + { + "version_value": "Prior to 1.44.0.0, 10.96.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "local unquoted search path" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04233en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04233en_us" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A local unquoted search path security vulnerability has been identified in HPE Agentless Management Service for Windows version(s): Prior to 1.44.0.0, 10.96.0.0. This vulnerability could be exploited locally by a user with high privileges to execute malware that may lead to a loss of confidentiality, integrity, and availability. HPE has provided software updates to resolve the vulnerability in HPE Agentless Management Service for Windows." } ] } diff --git a/2021/29xxx/CVE-2021-29219.json b/2021/29xxx/CVE-2021-29219.json index cbf19ce74d3..36bc92acadc 100644 --- a/2021/29xxx/CVE-2021-29219.json +++ b/2021/29xxx/CVE-2021-29219.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-29219", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HPE FlexNetwork 5130 EI Switch Series", + "version": { + "version_data": [ + { + "version_value": "Prior to 5130_EI_7.10.R3507P02" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "local buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04234en_us", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04234en_us" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A potential local buffer overflow vulnerability has been identified in HPE FlexNetwork 5130 EL Switch Series version: Prior to 5130_EI_7.10.R3507P02. HPE has made the following software update to resolve the vulnerability in HPE FlexNetwork 5130 EL Switch Series version 5130_EL_7.10.R3507P02." } ] } diff --git a/2021/32xxx/CVE-2021-32732.json b/2021/32xxx/CVE-2021-32732.json index cdd3fbd5f99..cbdc666e3e8 100644 --- a/2021/32xxx/CVE-2021-32732.json +++ b/2021/32xxx/CVE-2021-32732.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "### Impact\nIt's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tied to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests.\n\n### Patches\nThis issue has been patched in XWiki 12.10.5 and 13.2RC1. Two different patches are provided:\n - a first one to fix the CSRF problem\n - a more complex one that now relies on sending an email for the Forgot username process.\n\n### Workarounds\nIt's possible to fix the problem without uprading by editing the ForgotUsername page in version below 13.x, to use the following code: https://github.com/xwiki/xwiki-platform/blob/69548c0320cbd772540cf4668743e69f879812cf/xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-ui/src/main/resources/XWiki/ForgotUsername.xml#L39-L123\n\nIn version after 13.x it's also possible to edit manually the forgotusername.vm file, but it's really encouraged to upgrade the version here.\n\n### References\n * https://jira.xwiki.org/browse/XWIKI-18384\n * https://jira.xwiki.org/browse/XWIKI-18408\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira XWiki](https://jira.xwiki.org)\n* Email us at [security ML](mailto:security@xwiki.org)\n" + "value": "### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tied to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Patches This issue has been patched in XWiki 12.10.5 and 13.2RC1. Two different patches are provided: - a first one to fix the CSRF problem - a more complex one that now relies on sending an email for the Forgot username process. ### Workarounds It's possible to fix the problem without uprading by editing the ForgotUsername page in version below 13.x, to use the following code: https://github.com/xwiki/xwiki-platform/blob/69548c0320cbd772540cf4668743e69f879812cf/xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-ui/src/main/resources/XWiki/ForgotUsername.xml#L39-L123 In version after 13.x it's also possible to edit manually the forgotusername.vm file, but it's really encouraged to upgrade the version here. ### References * https://jira.xwiki.org/browse/XWIKI-18384 * https://jira.xwiki.org/browse/XWIKI-18408 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)" } ] }, diff --git a/2021/38xxx/CVE-2021-38130.json b/2021/38xxx/CVE-2021-38130.json index 7940a76b9aa..afacf9b7558 100644 --- a/2021/38xxx/CVE-2021-38130.json +++ b/2021/38xxx/CVE-2021-38130.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-38130", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@microfocus.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Voltage SecureMail Mail Relay.", + "version": { + "version_data": [ + { + "version_value": "All version prior to 7.3.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information leakage." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://portal.microfocus.com/s/article/KM000003667", + "url": "https://portal.microfocus.com/s/article/KM000003667" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A potential Information leakage vulnerability has been identified in versions of Micro Focus Voltage SecureMail Mail Relay prior to 7.3.0.1. The vulnerability could be exploited to create an information leakage attack." } ] } diff --git a/2021/39xxx/CVE-2021-39021.json b/2021/39xxx/CVE-2021-39021.json index b8ae09cce7f..81371f93095 100644 --- a/2021/39xxx/CVE-2021-39021.json +++ b/2021/39xxx/CVE-2021-39021.json @@ -1,90 +1,90 @@ { - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "U" - }, - "BM" : { - "UI" : "N", - "PR" : "N", - "I" : "N", - "C" : "L", - "AC" : "H", - "AV" : "N", - "A" : "N", - "S" : "U", - "SCORE" : "3.700" - } - } - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6552552", - "title" : "IBM Security Bulletin 6552552 (Security Guardium Data Encryption)", - "name" : "https://www.ibm.com/support/pages/node/6552552" - }, - { - "name" : "ibm-guardium-cve202139021-info-disc (213856)", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/213856", - "refsource" : "XF" - } - ] - }, - "data_type" : "CVE", - "description" : { - "description_data" : [ - { - "value" : "IBM Guardium Data Encryption (GDE) 5.0.0.2 behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which could facilitate username enumeration. IBM X-Force ID: 213856.", - "lang" : "eng" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2022-02-01T00:00:00", - "ID" : "CVE-2021-39021", - "ASSIGNER" : "psirt@us.ibm.com" - }, - "data_format" : "MITRE", - "data_version" : "4.0", - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Security Guardium Data Encryption", - "version" : { - "version_data" : [ - { - "version_value" : "5.0.0.2" - } - ] - } - } - ] - } + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "RL": "O", + "E": "U" + }, + "BM": { + "UI": "N", + "PR": "N", + "I": "N", + "C": "L", + "AC": "H", + "AV": "N", + "A": "N", + "S": "U", + "SCORE": "3.700" } - ] - } - } -} + } + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6552552", + "title": "IBM Security Bulletin 6552552 (Security Guardium Data Encryption)", + "name": "https://www.ibm.com/support/pages/node/6552552" + }, + { + "name": "ibm-guardium-cve202139021-info-disc (213856)", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/213856", + "refsource": "XF" + } + ] + }, + "data_type": "CVE", + "description": { + "description_data": [ + { + "value": "IBM Guardium Data Encryption (GDE) 5.0.0.2 behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which could facilitate username enumeration. IBM X-Force ID: 213856.", + "lang": "eng" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2022-02-01T00:00:00", + "ID": "CVE-2021-39021", + "ASSIGNER": "psirt@us.ibm.com" + }, + "data_format": "MITRE", + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Security Guardium Data Encryption", + "version": { + "version_data": [ + { + "version_value": "5.0.0.2" + } + ] + } + } + ] + } + } + ] + } + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40401.json b/2021/40xxx/CVE-2021-40401.json index 07151d76aa0..54e6bd5f608 100644 --- a/2021/40xxx/CVE-2021-40401.json +++ b/2021/40xxx/CVE-2021-40401.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-40401", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Gerbv", + "version": { + "version_data": [ + { + "version_value": "Gerbv 2.7.0 ,Gerbv forked 2.7.1 ,Gerbv dev (commit b5f1eacd)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "unchecked return value" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability." } ] } diff --git a/2021/40xxx/CVE-2021-40403.json b/2021/40xxx/CVE-2021-40403.json index 7de49b209e5..5a3189e3a86 100644 --- a/2021/40xxx/CVE-2021-40403.json +++ b/2021/40xxx/CVE-2021-40403.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-40403", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Gerbv", + "version": { + "version_data": [ + { + "version_value": "Gerbv 2.7.0 ,Gerbv forked 2.8.0 ,Gerbv dev (commit b5f1eacd)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Initialization of a Variable" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability." } ] } diff --git a/2021/40xxx/CVE-2021-40420.json b/2021/40xxx/CVE-2021-40420.json index 49d3ebfc7b2..4499afe8b0a 100644 --- a/2021/40xxx/CVE-2021-40420.json +++ b/2021/40xxx/CVE-2021-40420.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-40420", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Foxit", + "version": { + "version_data": [ + { + "version_value": "Foxit Reader 11.1.0.52543" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "use-after-free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free vulnerability exists in the JavaScript engine of Foxit Software\u2019s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled." } ] } diff --git a/2021/44xxx/CVE-2021-44204.json b/2021/44xxx/CVE-2021-44204.json index 184ac467f44..85767b2eecb 100644 --- a/2021/44xxx/CVE-2021-44204.json +++ b/2021/44xxx/CVE-2021-44204.json @@ -1,18 +1,115 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@acronis.com", + "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2021-44204", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Local privilege escalation via named pipe due to improper access control checks" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acronis Cyber Protect 15", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "28035" + } + ] + } + }, + { + "product_name": "Acronis Agent", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "27147" + } + ] + } + }, + { + "product_name": "Acronis Cyber Protect Home Office", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39612" + } + ] + } + }, + { + "product_name": "Acronis True Image 2021", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39287" + } + ] + } + } + ] + }, + "vendor_name": "Acronis" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "@xnand (https://hackerone.com/xnand)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security-advisory.acronis.com/advisories/SEC-2355", + "name": "https://security-advisory.acronis.com/advisories/SEC-2355" + } + ] + }, + "source": { + "advisory": "SEC-2355", + "defect": [ + "SEC-2355" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/44xxx/CVE-2021-44205.json b/2021/44xxx/CVE-2021-44205.json index 963b144a73b..1f85825ae4c 100644 --- a/2021/44xxx/CVE-2021-44205.json +++ b/2021/44xxx/CVE-2021-44205.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@acronis.com", + "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2021-44205", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Local privilege escalation due to DLL hijacking vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acronis Cyber Protect Home Office", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39612" + } + ] + } + }, + { + "product_name": "Acronis True Image 2021", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39287" + } + ] + } + } + ] + }, + "vendor_name": "Acronis" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "@xdanes09 (https://hackerone.com/xdanes09)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security-advisory.acronis.com/advisories/SEC-3059", + "name": "https://security-advisory.acronis.com/advisories/SEC-3059" + } + ] + }, + "source": { + "advisory": "SEC-3059", + "defect": [ + "SEC-3059" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/44xxx/CVE-2021-44206.json b/2021/44xxx/CVE-2021-44206.json index bf0a8f923ff..d4b9a49eb41 100644 --- a/2021/44xxx/CVE-2021-44206.json +++ b/2021/44xxx/CVE-2021-44206.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@acronis.com", + "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2021-44206", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acronis Cyber Protect Home Office", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39612" + } + ] + } + }, + { + "product_name": "Acronis True Image 2021", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39287" + } + ] + } + } + ] + }, + "vendor_name": "Acronis" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "@xdanes09 (https://hackerone.com/xdanes09)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security-advisory.acronis.com/advisories/SEC-3058", + "name": "https://security-advisory.acronis.com/advisories/SEC-3058" + } + ] + }, + "source": { + "advisory": "SEC-3058", + "defect": [ + "SEC-3058" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/44xxx/CVE-2021-44779.json b/2021/44xxx/CVE-2021-44779.json index 06b3b5a2989..b8dc41c257a 100644 --- a/2021/44xxx/CVE-2021-44779.json +++ b/2021/44xxx/CVE-2021-44779.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "audit@patchstack.com", + "DATE_PUBLIC": "2022-01-27T10:44:00.000Z", "ID": "CVE-2021-44779", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WordPress [GWA] AutoResponder plugin <= 2.3 - Unauthenticated SQL Injection (SQLi) vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "[GWA] AutoResponder (WordPress plugin)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "<= 2.3", + "version_value": "2.3" + } + ] + } + } + ] + }, + "vendor_name": "G.J.P." + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Vulnerability discovered by Lenon Leite (Patchstack Red Team project)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Unauthenticated SQL Injection (SQLi) vulnerability discovered in [GWA] AutoResponder WordPress plugin (versions <= 2.3), vulnerable at (&listid). No patched version available, plugin closed." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://wordpress.org/plugins/gwa-autoresponder/", + "refsource": "CONFIRM", + "url": "https://wordpress.org/plugins/gwa-autoresponder/" + }, + { + "name": "https://patchstack.com/database/vulnerability/gwa-autoresponder/wordpress-gwa-autoresponder-plugin-2-3-unauthenticated-sql-injection-sqli-vulnerability", + "refsource": "CONFIRM", + "url": "https://patchstack.com/database/vulnerability/gwa-autoresponder/wordpress-gwa-autoresponder-plugin-2-3-unauthenticated-sql-injection-sqli-vulnerability" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Deactivate and delete. No patched version is available. The plugin was closed on the wordpress.org plugin repository." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4154.json b/2021/4xxx/CVE-2021-4154.json index ae8cd979e92..249e5f507cf 100644 --- a/2021/4xxx/CVE-2021-4154.json +++ b/2021/4xxx/CVE-2021-4154.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-4154", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "Fixed in kernel 5.14 rc2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2034514", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034514" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system." } ] } diff --git a/2022/0xxx/CVE-2022-0218.json b/2022/0xxx/CVE-2022-0218.json index 736f887a406..2c7edd738ff 100644 --- a/2022/0xxx/CVE-2022-0218.json +++ b/2022/0xxx/CVE-2022-0218.json @@ -1,18 +1,113 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "Wordfence", + "ASSIGNER": "security@wordfence.com", "ID": "CVE-2022-0218", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WP HTML Mail <= 3.0.9 Missing Authorization on REST-API Route" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "WP HTML Mail", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "3.0.9", + "version_value": "3.0.9" + } + ] + } + } + ] + }, + "vendor_name": "codemiq" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Chloe Chamberland, Wordfence" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/", + "name": "https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/" + }, + { + "refsource": "MISC", + "url": "https://plugins.trac.wordpress.org/changeset/2656984/wp-html-mail/trunk/includes/class-template-designer.php", + "name": "https://plugins.trac.wordpress.org/changeset/2656984/wp-html-mail/trunk/includes/class-template-designer.php" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to version 3.1, or newer." + } + ], + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0264.json b/2022/0xxx/CVE-2022-0264.json index a0a3afd62e5..f04b452da47 100644 --- a/2022/0xxx/CVE-2022-0264.json +++ b/2022/0xxx/CVE-2022-0264.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-0264", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "kernel v5.16-rc6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2041547", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041547" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6" } ] } diff --git a/2022/0xxx/CVE-2022-0365.json b/2022/0xxx/CVE-2022-0365.json index 587953725a5..e27fac3d356 100644 --- a/2022/0xxx/CVE-2022-0365.json +++ b/2022/0xxx/CVE-2022-0365.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2022-02-01T23:08:00.000Z", "ID": "CVE-2022-0365", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Ricon Mobile, Inc." }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Industrial Cellular Router", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "S9922XL", + "version_value": "16.10.3" + }, + { + "version_affected": "=", + "version_name": "S9922L", + "version_value": "16.10.3" + } + ] + } + } + ] + }, + "vendor_name": "Ricon" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Gjoko Krstic of Zero Science Lab reported this vulnerability to CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 OS Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-01", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-01" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "Ricon Mobile has not responded to requests to work with CISA to mitigate this vulnerability. Users of the affected products are invited to contact Ricon Mobile customer support for additional information.\n\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:\n\nMinimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.\nLocate control system networks and remote devices behind firewalls and isolate them from the business network.\nWhen remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices." + } + ] } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0380.json b/2022/0xxx/CVE-2022-0380.json index a3009995a08..80809293b16 100644 --- a/2022/0xxx/CVE-2022-0380.json +++ b/2022/0xxx/CVE-2022-0380.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "Wordfence", + "ASSIGNER": "security@wordfence.com", "ID": "CVE-2022-0380", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Fotobook <= 3.2.3 Reflected Cross-Site Scripting" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Fotobook", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "3.2.3", + "version_value": "3.2.3" + } + ] + } + } + ] + }, + "vendor_name": "Fotobook" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "p7e4" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Fotobook WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping and the use of $_SERVER['PHP_SELF'] found in the ~/options-fotobook.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 3.2.3." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-03801", + "name": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-03801" + }, + { + "refsource": "MISC", + "url": "https://plugins.trac.wordpress.org/browser/fotobook/tags/3.2.3/options-fotobook.php#L128", + "name": "https://plugins.trac.wordpress.org/browser/fotobook/tags/3.2.3/options-fotobook.php#L128" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Uninstall plugin from WordPress site." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0381.json b/2022/0xxx/CVE-2022-0381.json index bc2354811eb..5bb19dbd595 100644 --- a/2022/0xxx/CVE-2022-0381.json +++ b/2022/0xxx/CVE-2022-0381.json @@ -1,18 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "Wordfence", + "ASSIGNER": "security@wordfence.com", "ID": "CVE-2022-0381", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Embed Swagger <= 1.0.0 Reflected Cross-Site Scripting" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Embed Swagger", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.0.0", + "version_value": "1.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Embed Swagger" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Muhammad Zeeshan (Xib3rR4dAr)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Embed Swagger WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping/sanitization and validation via the url parameter found in the ~/swagger-iframe.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 1.0.0." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0381", + "name": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0381" + }, + { + "refsource": "MISC", + "url": "https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3", + "name": "https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3" + }, + { + "refsource": "MISC", + "url": "https://plugins.trac.wordpress.org/browser/embed-swagger/trunk/swagger-iframe.php#L59", + "name": "https://plugins.trac.wordpress.org/browser/embed-swagger/trunk/swagger-iframe.php#L59" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Uninstall plugin from site." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0484.json b/2022/0xxx/CVE-2022-0484.json index 82a9cfcc57d..d243f36f10e 100644 --- a/2022/0xxx/CVE-2022-0484.json +++ b/2022/0xxx/CVE-2022-0484.json @@ -1,18 +1,95 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@mirantis.com", + "DATE_PUBLIC": "2022-02-03T17:30:00.000Z", "ID": "CVE-2022-0484", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Improper URL Validation causes Mirantis Container Cloud Lens Extension to open external programs" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Mirantis Container Cloud Lens Extension", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "v3", + "version_value": "v3.1.1" + } + ] + } + } + ] + }, + "vendor_name": "Mirantis" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Mirantis PSIRT" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lack of validation of URLs causes Mirantis Container Cloud Lens Extension before v3.1.1 to open external programs other than the default browser to perform sign on to a new cluster. An attacker could host a webserver which serves a malicious Mirantis Container Cloud configuration file and induce the victim to add a new cluster via its URL. This issue affects: Mirantis Mirantis Container Cloud Lens Extension v3 versions prior to v3.1.1." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://github.com/Mirantis/security/blob/main/advisories/0005.md", + "name": "https://github.com/Mirantis/security/blob/main/advisories/0005.md" + } + ] + }, + "source": { + "advisory": "0005", + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0487.json b/2022/0xxx/CVE-2022-0487.json index cd32b70ba49..2c4658e9af6 100644 --- a/2022/0xxx/CVE-2022-0487.json +++ b/2022/0xxx/CVE-2022-0487.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-0487", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "kernel 5.14 rc1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2044561", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044561" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1." } ] } diff --git a/2022/0xxx/CVE-2022-0498.json b/2022/0xxx/CVE-2022-0498.json index 87bf9cefcaa..11238373539 100644 --- a/2022/0xxx/CVE-2022-0498.json +++ b/2022/0xxx/CVE-2022-0498.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2022-0498", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2022/22xxx/CVE-2022-22150.json b/2022/22xxx/CVE-2022-22150.json index b1b4e587d7d..8fd499615e8 100644 --- a/2022/22xxx/CVE-2022-22150.json +++ b/2022/22xxx/CVE-2022-22150.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22150", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Foxit", + "version": { + "version_data": [ + { + "version_value": "Foxit Reader 11.1.0.52543" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Cleanup on Thrown Exception" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory corruption vulnerability exists in the JavaScript engine of Foxit Software\u2019s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger an exception which is improperly handled, leaving the engine in an invalid state, which can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled." } ] } diff --git a/2022/22xxx/CVE-2022-22689.json b/2022/22xxx/CVE-2022-22689.json index db4a463cbaa..92864c2b430 100644 --- a/2022/22xxx/CVE-2022-22689.json +++ b/2022/22xxx/CVE-2022-22689.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22689", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vuln@ca.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CA Harvest Software Change Manager", + "version": { + "version_data": [ + { + "version_value": "13.0.3, 13.0.4, 14.0.0, 14.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1236: Improper Neutralization of Formula Elements in a CSV File" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.broadcom.com/security-advisory/content/security-advisories/CA20220203-01-Security-Notice-for-CA-Harvest-Software-Change-Manager/ESDSA20297", + "url": "https://support.broadcom.com/security-advisory/content/security-advisories/CA20220203-01-Security-Notice-for-CA-Harvest-Software-Change-Manager/ESDSA20297" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CA Harvest Software Change Manager versions 13.0.3, 13.0.4, 14.0.0, and 14.0.1, contain a vulnerability in the CSV export functionality, due to insufficient input validation, that can allow a privileged user to potentially execute arbitrary code or commands." } ] } diff --git a/2022/22xxx/CVE-2022-22722.json b/2022/22xxx/CVE-2022-22722.json index feac77f21f3..8b5159e4efd 100644 --- a/2022/22xxx/CVE-2022-22722.json +++ b/2022/22xxx/CVE-2022-22722.json @@ -1,47 +1,35 @@ { + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "cybersecurity@se.com", "ID": "CVE-2022-22722", + "ASSIGNER": "cybersecurity@schneider-electric.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Easergy P5", + "product_name": "Easergy P5 (All firmware versions prior to V01.401.101)", "version": { "version_data": [ { - "version_affected": "<", - "version_value": "01.401.101" + "version_value": "Easergy P5 (All firmware versions prior to V01.401.101)" } ] } } ] - }, - "vendor_name": "Schneider Electric" + } } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to the product they could potentially observe and manipulate traffic associated with product configuration. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)" - } - ] - }, - "generator": { - "engine": "Vulnogram 0.0.9" - }, "problemtype": { "problemtype_data": [ { @@ -57,12 +45,18 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03" } ] }, - "source": { - "discovery": "UNKNOWN" + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to the product they could potentially observe and manipulate traffic associated with product configuration. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)" + } + ] } } \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22723.json b/2022/22xxx/CVE-2022-22723.json index 10e8caaaa00..cc8994a0d65 100644 --- a/2022/22xxx/CVE-2022-22723.json +++ b/2022/22xxx/CVE-2022-22723.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22723", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Easergy P5 (All firmware versions prior to V01.401.101)", + "version": { + "version_data": [ + { + "version_value": "Easergy P5 (All firmware versions prior to V01.401.101)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)" } ] } diff --git a/2022/22xxx/CVE-2022-22724.json b/2022/22xxx/CVE-2022-22724.json index c430db3874e..7c15493fc7f 100644 --- a/2022/22xxx/CVE-2022-22724.json +++ b/2022/22xxx/CVE-2022-22724.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22724", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Modicon M340 CPUs: BMXP34 (All Versions) ", + "version": { + "version_data": [ + { + "version_value": "Modicon M340 CPUs: BMXP34 (All Versions)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400: Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-01", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause a denial of service on ports 80 (HTTP) and 502 (Modbus), when sending a large number of TCP RST or FIN packets to any open TCP port of the PLC. Affected Product: Modicon M340 CPUs: BMXP34 (All Versions)" } ] } diff --git a/2022/22xxx/CVE-2022-22725.json b/2022/22xxx/CVE-2022-22725.json index 549390a181b..c50dfe97bcf 100644 --- a/2022/22xxx/CVE-2022-22725.json +++ b/2022/22xxx/CVE-2022-22725.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22725", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Easergy P3 (All versions prior to V30.205)", + "version": { + "version_data": [ + { + "version_value": "Easergy P3 (All versions prior to V30.205)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-04", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-04" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P3 (All versions prior to V30.205)" } ] } diff --git a/2022/22xxx/CVE-2022-22726.json b/2022/22xxx/CVE-2022-22726.json index 26728517bc7..86197872c5f 100644 --- a/2022/22xxx/CVE-2022-22726.json +++ b/2022/22xxx/CVE-2022-22726.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22726", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "EcoStruxure Power Monitoring Expert (Versions 2020 and prior)", + "version": { + "version_data": [ + { + "version_value": "EcoStruxure Power Monitoring Expert (Versions 2020 and prior)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-07", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-07" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-20: Improper Input Validation vulnerability exists that could allow arbitrary files on the server to be read by authenticated users through a limited operating system service account. Affected Product: EcoStruxure Power Monitoring Expert (Versions 2020 and prior)" } ] } diff --git a/2022/22xxx/CVE-2022-22727.json b/2022/22xxx/CVE-2022-22727.json index cd8fb6a0e85..b250870c887 100644 --- a/2022/22xxx/CVE-2022-22727.json +++ b/2022/22xxx/CVE-2022-22727.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22727", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "EcoStruxure Power Monitoring Expert (Versions 2020 and prior)", + "version": { + "version_data": [ + { + "version_value": "EcoStruxure Power Monitoring Expert (Versions 2020 and prior)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-07", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-07" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-20: Improper Input Validation vulnerability exists that could allow an unauthenticated attacker to view data, change settings, impact availability of the software, or potentially impact a user\ufffds local machine when the user clicks a specially crafted link. Affected Product: EcoStruxure Power Monitoring Expert (Versions 2020 and prior)" } ] } diff --git a/2022/22xxx/CVE-2022-22804.json b/2022/22xxx/CVE-2022-22804.json index 3ea6a0fd7b9..5907b3facf6 100644 --- a/2022/22xxx/CVE-2022-22804.json +++ b/2022/22xxx/CVE-2022-22804.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22804", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "EcoStruxure Power Monitoring Expert (Versions 2020 and prior)", + "version": { + "version_data": [ + { + "version_value": "EcoStruxure Power Monitoring Expert (Versions 2020 and prior)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-07", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-07" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could allow an authenticated attacker to view data, change settings, or impact availability of the software when the user visits a page containing the injected payload. Affected Product: EcoStruxure Power Monitoring Expert (Versions 2020 and prior)" } ] } diff --git a/2022/22xxx/CVE-2022-22939.json b/2022/22xxx/CVE-2022-22939.json index 4773300c390..cdedf02c915 100644 --- a/2022/22xxx/CVE-2022-22939.json +++ b/2022/22xxx/CVE-2022-22939.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22939", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@vmware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "VMware Cloud Foundation", + "version": { + "version_data": [ + { + "version_value": "VMware Cloud Foundation 4.x (before 4.3.1.1) and 3.x" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "VMware Cloud Foundation updates address an information disclosure vulnerability." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.vmware.com/security/advisories/VMSA-2022-0003.html", + "url": "https://www.vmware.com/security/advisories/VMSA-2022-0003.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VMware Cloud Foundation contains an information disclosure vulnerability due to logging of credentials in plain-text within multiple log files on the SDDC Manager. A malicious actor with root access on VMware Cloud Foundation SDDC Manager may be able to view credentials in plaintext within one or more log files." } ] } diff --git a/2022/22xxx/CVE-2022-22987.json b/2022/22xxx/CVE-2022-22987.json index b8575abc0bd..a3bafd084bf 100644 --- a/2022/22xxx/CVE-2022-22987.json +++ b/2022/22xxx/CVE-2022-22987.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2022-02-01T23:08:00.000Z", "ID": "CVE-2022-22987", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Advantech ADAM-3600" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ADAM-3600", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "ADAM-3600", + "version_value": "2.6.2" + } + ] + } + } + ] + }, + "vendor_name": "Advantech" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Aagam Shah (neutrinoguy) reported this vulnerability to CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The affected product has a hardcoded private key available inside the project folder, which may allow an attacker to achieve Web Server login and perform further actions." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-321 Use of Hard-coded Cryptographic Key" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-02", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-02" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "Advantech is aware of the issue and is currently developing a solution. For more information, contact Advantech technical support. \n\nAdvantech recommends users add their own generated SSL private key." + } + ] } \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23379.json b/2022/23xxx/CVE-2022-23379.json index da5d985ff26..67b0d3d373e 100644 --- a/2022/23xxx/CVE-2022-23379.json +++ b/2022/23xxx/CVE-2022-23379.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23379", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23379", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Emlog v6.0 was discovered to contain a SQL injection vulnerability via the $TagID parameter of getblogidsfromtagid()." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emlog/emlog/issues/144", + "refsource": "MISC", + "name": "https://github.com/emlog/emlog/issues/144" } ] } diff --git a/2022/23xxx/CVE-2022-23558.json b/2022/23xxx/CVE-2022-23558.json index 7f90d470b57..cffcfa46bf4 100644 --- a/2022/23xxx/CVE-2022-23558.json +++ b/2022/23xxx/CVE-2022-23558.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range." + "value": "Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range." } ] }, diff --git a/2022/23xxx/CVE-2022-23562.json b/2022/23xxx/CVE-2022-23562.json index 06ff0cd4844..e1e42a44c00 100644 --- a/2022/23xxx/CVE-2022-23562.json +++ b/2022/23xxx/CVE-2022-23562.json @@ -75,6 +75,11 @@ }, "references": { "reference_data": [ + { + "name": "https://github.com/tensorflow/tensorflow/pull/51733", + "refsource": "MISC", + "url": "https://github.com/tensorflow/tensorflow/pull/51733" + }, { "name": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr", "refsource": "CONFIRM", @@ -85,11 +90,6 @@ "refsource": "MISC", "url": "https://github.com/tensorflow/tensorflow/issues/52676" }, - { - "name": "https://github.com/tensorflow/tensorflow/pull/51733", - "refsource": "MISC", - "url": "https://github.com/tensorflow/tensorflow/pull/51733" - }, { "name": "https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732", "refsource": "MISC", diff --git a/2022/23xxx/CVE-2022-23946.json b/2022/23xxx/CVE-2022-23946.json index cee1be0b538..12bcae05620 100644 --- a/2022/23xxx/CVE-2022-23946.json +++ b/2022/23xxx/CVE-2022-23946.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23946", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "KiCAD", + "version": { + "version_data": [ + { + "version_value": "KiCad EDA 6.0.1,KiCad EDA master commit de006fc010" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "stack-based buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon GCodeNumber parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability." } ] } diff --git a/2022/23xxx/CVE-2022-23947.json b/2022/23xxx/CVE-2022-23947.json index 36dc4a327b1..d8e965b563c 100644 --- a/2022/23xxx/CVE-2022-23947.json +++ b/2022/23xxx/CVE-2022-23947.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23947", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "KiCAD", + "version": { + "version_data": [ + { + "version_value": "KiCad EDA 6.0.1,KiCad EDA master commit de006fc010" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "stack-based buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon DCodeNumber parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability." } ] } diff --git a/2022/23xxx/CVE-2022-23980.json b/2022/23xxx/CVE-2022-23980.json index 14f59652671..d3d1bf8c78e 100644 --- a/2022/23xxx/CVE-2022-23980.json +++ b/2022/23xxx/CVE-2022-23980.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "audit@patchstack.com", + "DATE_PUBLIC": "2022-02-03T21:54:00.000Z", "ID": "CVE-2022-23980", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WordPress Yasr \u2013 Yet Another Stars Rating plugin <= 2.9.9 - Cross-Site Scripting (XSS) vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Yasr \u2013 Yet Another Stars Rating (WordPress plugin)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "<= 2.9.9", + "version_value": "2.9.9" + } + ] + } + } + ] + }, + "vendor_name": "Dario Curvino" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Vulnerability discovered by ThuraMoeMyint (Patchstack Red Team project)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-Site Scripting (XSS) vulnerability discovered in Yasr \u2013 Yet Another Stars Rating WordPress plugin (versions <= 2.9.9), vulnerable at parameter 'source'." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://wordpress.org/plugins/yet-another-stars-rating/#developers", + "refsource": "CONFIRM", + "url": "https://wordpress.org/plugins/yet-another-stars-rating/#developers" + }, + { + "name": "https://patchstack.com/database/vulnerability/yet-another-stars-rating/wordpress-yasr-yet-another-stars-rating-plugin-2-9-9-cross-site-scripting-xss-vulnerability", + "refsource": "CONFIRM", + "url": "https://patchstack.com/database/vulnerability/yet-another-stars-rating/wordpress-yasr-yet-another-stars-rating-plugin-2-9-9-cross-site-scripting-xss-vulnerability" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to 3.0.0 or higher version." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24113.json b/2022/24xxx/CVE-2022-24113.json index dfaee7144ca..57fcc552f7c 100644 --- a/2022/24xxx/CVE-2022-24113.json +++ b/2022/24xxx/CVE-2022-24113.json @@ -1,18 +1,115 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@acronis.com", + "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2022-24113", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Local privilege escalation due to excessive permissions assigned to child processes" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acronis Cyber Protect 15", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "28035" + } + ] + } + }, + { + "product_name": "Acronis Agent", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "27147" + } + ] + } + }, + { + "product_name": "Acronis Cyber Protect Home Office", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39612" + } + ] + } + }, + { + "product_name": "Acronis True Image 2021", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_value": "39287" + } + ] + } + } + ] + }, + "vendor_name": "Acronis" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "@penrose (https://hackerone.com/penrose)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security-advisory.acronis.com/advisories/SEC-2881", + "name": "https://security-advisory.acronis.com/advisories/SEC-2881" + } + ] + }, + "source": { + "advisory": "SEC-2881", + "defect": [ + "SEC-2881" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24114.json b/2022/24xxx/CVE-2022-24114.json index e8873bb9616..938e8d40f59 100644 --- a/2022/24xxx/CVE-2022-24114.json +++ b/2022/24xxx/CVE-2022-24114.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@acronis.com", + "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2022-24114", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Local privilege escalation due to race condition on application startup" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acronis Cyber Protect Home Office", + "version": { + "version_data": [ + { + "platform": "macOS", + "version_affected": "<", + "version_value": "39605" + } + ] + } + }, + { + "product_name": "Acronis True Image 2021", + "version": { + "version_data": [ + { + "platform": "macOS", + "version_affected": "<", + "version_value": "39287" + } + ] + } + } + ] + }, + "vendor_name": "Acronis" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "@vkas-afk (https://hackerone.com/vkas-afk)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-362" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security-advisory.acronis.com/advisories/SEC-3316", + "name": "https://security-advisory.acronis.com/advisories/SEC-3316" + } + ] + }, + "source": { + "advisory": "SEC-3316", + "defect": [ + "SEC-3316" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24115.json b/2022/24xxx/CVE-2022-24115.json index 7b4b4d9148a..87dd5478e4e 100644 --- a/2022/24xxx/CVE-2022-24115.json +++ b/2022/24xxx/CVE-2022-24115.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@acronis.com", + "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2022-24115", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Local privilege escalation due to unrestricted loading of unsigned libraries" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Acronis Cyber Protect Home Office", + "version": { + "version_data": [ + { + "platform": "macOS", + "version_affected": "<", + "version_value": "39605" + } + ] + } + }, + { + "product_name": "Acronis True Image 2021", + "version": { + "version_data": [ + { + "platform": "macOS", + "version_affected": "<", + "version_value": "39287" + } + ] + } + } + ] + }, + "vendor_name": "Acronis" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "@vkas-afk (https://hackerone.com/vkas-afk)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-347" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security-advisory.acronis.com/advisories/SEC-3359", + "name": "https://security-advisory.acronis.com/advisories/SEC-3359" + } + ] + }, + "source": { + "advisory": "SEC-3359", + "defect": [ + "SEC-3359" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24449.json b/2022/24xxx/CVE-2022-24449.json new file mode 100644 index 00000000000..549aeed99e8 --- /dev/null +++ b/2022/24xxx/CVE-2022-24449.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24449", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24450.json b/2022/24xxx/CVE-2022-24450.json new file mode 100644 index 00000000000..4ae496070b1 --- /dev/null +++ b/2022/24xxx/CVE-2022-24450.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24450", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file