diff --git a/2020/11xxx/CVE-2020-11497.json b/2020/11xxx/CVE-2020-11497.json index 10ef7b93be4..61e36f5ff1d 100644 --- a/2020/11xxx/CVE-2020-11497.json +++ b/2020/11xxx/CVE-2020-11497.json @@ -57,10 +57,20 @@ "refsource": "MISC", "name": "https://www.themissinglink.com.au/security-advisories-cve-2020-11497" }, + { + "refsource": "FULLDISC", + "name": "20200821 Payment bypass in WordPress - WooCommerce - NAB Transact plugin disclosure", + "url": "http://seclists.org/fulldisclosure/2020/Aug/13" + }, { "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2020/Aug/13", "url": "http://seclists.org/fulldisclosure/2020/Aug/13" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/158931/WordPress-NAB-Transact-WooCommerce-2.1.0-Payment-Bypass.html", + "url": "http://packetstormsecurity.com/files/158931/WordPress-NAB-Transact-WooCommerce-2.1.0-Payment-Bypass.html" } ] } diff --git a/2020/14xxx/CVE-2020-14344.json b/2020/14xxx/CVE-2020-14344.json index 1c358c5e490..0d77ea341e0 100644 --- a/2020/14xxx/CVE-2020-14344.json +++ b/2020/14xxx/CVE-2020-14344.json @@ -78,6 +78,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1198", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-eba554b9d5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/" } ] }, diff --git a/2020/14xxx/CVE-2020-14415.json b/2020/14xxx/CVE-2020-14415.json index 862ba82db25..3725d73af02 100644 --- a/2020/14xxx/CVE-2020-14415.json +++ b/2020/14xxx/CVE-2020-14415.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14415", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14415", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "oss_write in audio/ossaudio.c in QEMU before 5.0.0 mishandles a buffer position." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "UBUNTU", + "name": "USN-4467-1", + "url": "https://usn.ubuntu.com/4467-1/" + }, + { + "refsource": "CONFIRM", + "name": "https://git.qemu.org/?p=qemu.git;a=commit;h=7a4ede0047a8613b0e3b72c9d351038f013dd357", + "url": "https://git.qemu.org/?p=qemu.git;a=commit;h=7a4ede0047a8613b0e3b72c9d351038f013dd357" } ] } diff --git a/2020/16xxx/CVE-2020-16142.json b/2020/16xxx/CVE-2020-16142.json index a1f9207fcbd..1be1fe953aa 100644 --- a/2020/16xxx/CVE-2020-16142.json +++ b/2020/16xxx/CVE-2020-16142.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-16142", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-16142", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "On Mercedes-Benz C Class AMG Premium Plus c220 BlueTec vehicles, the Bluetooth stack mishandles %x and %c format-string specifiers in a device name in the COMAND infotainment software." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://medium.com/@reliable_lait_mouse_975/mercedes-comand-infotainment-improper-format-strings-handling-4c67063d744e", + "url": "https://medium.com/@reliable_lait_mouse_975/mercedes-comand-infotainment-improper-format-strings-handling-4c67063d744e" } ] } diff --git a/2020/16xxx/CVE-2020-16245.json b/2020/16xxx/CVE-2020-16245.json index e96559d7436..2e7bf100ca2 100644 --- a/2020/16xxx/CVE-2020-16245.json +++ b/2020/16xxx/CVE-2020-16245.json @@ -48,6 +48,51 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-238-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-238-01" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1085/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1085/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1089/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1089/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1092/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1092/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1086/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1086/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1091/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1091/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1087/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1087/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1088/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1088/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1090/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1090/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1084/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1084/" } ] }, diff --git a/2020/17xxx/CVE-2020-17498.json b/2020/17xxx/CVE-2020-17498.json index 9e1d365dd2a..066a67a3839 100644 --- a/2020/17xxx/CVE-2020-17498.json +++ b/2020/17xxx/CVE-2020-17498.json @@ -71,6 +71,16 @@ "refsource": "GENTOO", "name": "GLSA-202008-14", "url": "https://security.gentoo.org/glsa/202008-14" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-2981a0224d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7LO7DAPN33FL4JQ7DDPB76SIEFGMZSQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-7f91f10f2b", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AII7UYDPNKYE75AZL45M6HAV2COP7F6S/" } ] } diff --git a/2020/1xxx/CVE-2020-1457.json b/2020/1xxx/CVE-2020-1457.json index 8881c7b65d5..ab857963ab5 100644 --- a/2020/1xxx/CVE-2020-1457.json +++ b/2020/1xxx/CVE-2020-1457.json @@ -226,6 +226,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1457", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1457" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1081/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1081/" } ] } diff --git a/2020/23xxx/CVE-2020-23576.json b/2020/23xxx/CVE-2020-23576.json index 86a1af579ea..fe95f6735bd 100644 --- a/2020/23xxx/CVE-2020-23576.json +++ b/2020/23xxx/CVE-2020-23576.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23576", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23576", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Laborator Neon dashboard v3 is affected by stored Cross Site Scripting (XSS) via the chat tab." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://vimeo.com/427083932", + "refsource": "MISC", + "name": "https://vimeo.com/427083932" } ] } diff --git a/2020/24xxx/CVE-2020-24390.json b/2020/24xxx/CVE-2020-24390.json index 65982cca127..34186c69d3f 100644 --- a/2020/24xxx/CVE-2020-24390.json +++ b/2020/24xxx/CVE-2020-24390.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24390", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24390", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "eonweb in EyesOfNetwork before 5.3-7 does not properly escape the username on the /module/admin_logs page, which might allow pre-authentication stored XSS during login/logout logs recording." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.eyesofnetwork.com/fr/news/fr-CVE-2020-24390", + "url": "https://www.eyesofnetwork.com/fr/news/fr-CVE-2020-24390" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-7", + "url": "https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-7" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/EyesOfNetworkCommunity/eonweb/commit/c416b52d3b500d96ab40875f95b7c7939628854b", + "url": "https://github.com/EyesOfNetworkCommunity/eonweb/commit/c416b52d3b500d96ab40875f95b7c7939628854b" } ] } diff --git a/2020/24xxx/CVE-2020-24702.json b/2020/24xxx/CVE-2020-24702.json new file mode 100644 index 00000000000..b1b1c955f0e --- /dev/null +++ b/2020/24xxx/CVE-2020-24702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-24702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/24xxx/CVE-2020-24703.json b/2020/24xxx/CVE-2020-24703.json new file mode 100644 index 00000000000..17fbb6b742e --- /dev/null +++ b/2020/24xxx/CVE-2020-24703.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-24703", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in certain WSO2 products. A valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, aka Session Hijacking. This affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator through 6.6.0, IS as Key Manager 5.5.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, and IoT Server 3.3.0 and 3.3.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0687", + "refsource": "MISC", + "name": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0687" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:R", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2020/24xxx/CVE-2020-24704.json b/2020/24xxx/CVE-2020-24704.json new file mode 100644 index 00000000000..27f3895a5ce --- /dev/null +++ b/2020/24xxx/CVE-2020-24704.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-24704", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in certain WSO2 products. The Try It tool allows Reflected XSS. This affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator through 6.6.0, IS as Key Manager 5.5.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, and IoT Server 3.3.0 and 3.3.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0685", + "refsource": "MISC", + "name": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0685" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:L/I:L/PR:N/S:C/UI:R", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2020/24xxx/CVE-2020-24705.json b/2020/24xxx/CVE-2020-24705.json new file mode 100644 index 00000000000..04f1e2c1b21 --- /dev/null +++ b/2020/24xxx/CVE-2020-24705.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-24705", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in certain WSO2 products. A valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, aka Session Hijacking. This affects API Manager through 3.1.0, API Manager Analytics 2.5.0, IS as Key Manager through 5.10.0, Identity Server through 5.10.0, Identity Server Analytics through 5.6.0, and IoT Server 3.1.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0718", + "refsource": "MISC", + "name": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0718" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:R", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2020/24xxx/CVE-2020-24706.json b/2020/24xxx/CVE-2020-24706.json new file mode 100644 index 00000000000..ffc97f57075 --- /dev/null +++ b/2020/24xxx/CVE-2020-24706.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-24706", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in certain WSO2 products. The Try It tool allows Reflected XSS. This affects API Manager through 3.1.0, API Manager Analytics 2.5.0, IS as Key Manager through 5.10.0, Identity Server through 5.10.0, Identity Server Analytics through 5.6.0, and IoT Server 3.1.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0718", + "refsource": "MISC", + "name": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0718" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:L/I:L/PR:N/S:C/UI:R", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3338.json b/2020/3xxx/CVE-2020-3338.json index 30a2d0e3807..e39afdb0fde 100644 --- a/2020/3xxx/CVE-2020-3338.json +++ b/2020/3xxx/CVE-2020-3338.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the Protocol Independent Multicast (PIM) feature for IPv6 networks (PIM6) of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r The vulnerability is due to improper error handling when processing inbound PIM6 packets. An attacker could exploit this vulnerability by sending multiple crafted PIM6 packets to an affected device. A successful exploit could allow the attacker to cause the PIM6 application to leak system memory. Over time, this memory leak could cause the PIM6 application to stop processing legitimate PIM6 traffic, leading to a DoS condition on the affected device.\r " + "value": "A vulnerability in the Protocol Independent Multicast (PIM) feature for IPv6 networks (PIM6) of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper error handling when processing inbound PIM6 packets. An attacker could exploit this vulnerability by sending multiple crafted PIM6 packets to an affected device. A successful exploit could allow the attacker to cause the PIM6 application to leak system memory. Over time, this memory leak could cause the PIM6 application to stop processing legitimate PIM6 traffic, leading to a DoS condition on the affected device." } ] }, @@ -84,4 +84,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3394.json b/2020/3xxx/CVE-2020-3394.json index fe82092175f..47cb55716f9 100644 --- a/2020/3xxx/CVE-2020-3394.json +++ b/2020/3xxx/CVE-2020-3394.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the Enable Secret feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, local attacker to issue the enable command and get full administrative privileges. To exploit this vulnerability, the attacker would need to have valid credentials for the affected device.\r The vulnerability is due to a logic error in the implementation of the enable command. An attacker could exploit this vulnerability by logging in to the device and issuing the enable command. A successful exploit could allow the attacker to gain full administrative privileges without using the enable password.\r Note: The Enable Secret feature is disabled by default.\r " + "value": "A vulnerability in the Enable Secret feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, local attacker to issue the enable command and get full administrative privileges. To exploit this vulnerability, the attacker would need to have valid credentials for the affected device. The vulnerability is due to a logic error in the implementation of the enable command. An attacker could exploit this vulnerability by logging in to the device and issuing the enable command. A successful exploit could allow the attacker to gain full administrative privileges without using the enable password. Note: The Enable Secret feature is disabled by default." } ] }, @@ -83,4 +83,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3397.json b/2020/3xxx/CVE-2020-3397.json index 2a9dfbfc577..40c529f9160 100644 --- a/2020/3xxx/CVE-2020-3397.json +++ b/2020/3xxx/CVE-2020-3397.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.\r The vulnerability is due to incomplete input validation of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this specific, valid BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause one of the BGP-related routing applications to restart multiple times, leading to a system-level restart.\r Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system.\r " + "value": "A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this specific, valid BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause one of the BGP-related routing applications to restart multiple times, leading to a system-level restart. Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system." } ] }, @@ -83,4 +83,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3398.json b/2020/3xxx/CVE-2020-3398.json index 91a99c08c2d..7b8c1deeb7b 100644 --- a/2020/3xxx/CVE-2020-3398.json +++ b/2020/3xxx/CVE-2020-3398.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a BGP session to repeatedly reset, causing a partial denial of service (DoS) condition due to the BGP session being down.\r The vulnerability is due to incorrect parsing of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause the BGP peer connections to reset, which could lead to BGP route instability and impact traffic. The incoming BGP MVPN update message is valid but is parsed incorrectly by the NX-OS device, which could send a corrupted BGP update to the configured BGP peer. \r Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system.\r " + "value": "A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a BGP session to repeatedly reset, causing a partial denial of service (DoS) condition due to the BGP session being down. The vulnerability is due to incorrect parsing of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause the BGP peer connections to reset, which could lead to BGP route instability and impact traffic. The incoming BGP MVPN update message is valid but is parsed incorrectly by the NX-OS device, which could send a corrupted BGP update to the configured BGP peer. Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system." } ] }, @@ -83,4 +83,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3415.json b/2020/3xxx/CVE-2020-3415.json index 414ae5d383d..008454cdc92 100644 --- a/2020/3xxx/CVE-2020-3415.json +++ b/2020/3xxx/CVE-2020-3415.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the Data Management Engine (DME) of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device.\r The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.\r Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Exploitation of this vulnerability also requires jumbo frames to be enabled on the interface that receives the crafted Cisco Discovery Protocol packets on the affected device.\r " + "value": "A vulnerability in the Data Management Engine (DME) of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Exploitation of this vulnerability also requires jumbo frames to be enabled on the interface that receives the crafted Cisco Discovery Protocol packets on the affected device." } ] }, @@ -84,4 +84,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3454.json b/2020/3xxx/CVE-2020-3454.json index 030308d044c..d584aeeec9b 100644 --- a/2020/3xxx/CVE-2020-3454.json +++ b/2020/3xxx/CVE-2020-3454.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the Call Home feature of Cisco NX-OS Software could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges on the underlying operating system (OS).\r The vulnerability is due to insufficient input validation of specific Call Home configuration parameters when the software is configured for transport method HTTP. An attacker could exploit this vulnerability by modifying parameters within the Call Home configuration on an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying OS.\r " + "value": "A vulnerability in the Call Home feature of Cisco NX-OS Software could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of specific Call Home configuration parameters when the software is configured for transport method HTTP. An attacker could exploit this vulnerability by modifying parameters within the Call Home configuration on an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying OS." } ] }, @@ -87,4 +87,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3504.json b/2020/3xxx/CVE-2020-3504.json index 0286453e1b9..29e89d8d26c 100644 --- a/2020/3xxx/CVE-2020-3504.json +++ b/2020/3xxx/CVE-2020-3504.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the local management (local-mgmt) CLI of Cisco UCS Manager Software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device.\r The vulnerability is due to improper handling of CLI command parameters. An attacker could exploit this vulnerability by executing specific commands on the local-mgmt CLI on an affected device. A successful exploit could allow the attacker to cause internal system processes to fail to terminate properly, which could result in a buildup of stuck processes and lead to slowness in accessing the UCS Manager CLI and web UI. A sustained attack may result in a restart of internal UCS Manager processes and a temporary loss of access to the UCS Manager CLI and web UI.\r " + "value": "A vulnerability in the local management (local-mgmt) CLI of Cisco UCS Manager Software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of CLI command parameters. An attacker could exploit this vulnerability by executing specific commands on the local-mgmt CLI on an affected device. A successful exploit could allow the attacker to cause internal system processes to fail to terminate properly, which could result in a buildup of stuck processes and lead to slowness in accessing the UCS Manager CLI and web UI. A sustained attack may result in a restart of internal UCS Manager processes and a temporary loss of access to the UCS Manager CLI and web UI." } ] }, @@ -83,4 +83,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3517.json b/2020/3xxx/CVE-2020-3517.json index 5795f19f26f..aaa82c96087 100644 --- a/2020/3xxx/CVE-2020-3517.json +++ b/2020/3xxx/CVE-2020-3517.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated attacker to cause process crashes, which could result in a denial of service (DoS) condition on an affected device. The attack vector is configuration dependent and could be remote or adjacent. For more information about the attack vector, see the Details section of this advisory.\r The vulnerability is due to insufficient error handling when the affected software parses Cisco Fabric Services messages. An attacker could exploit this vulnerability by sending malicious Cisco Fabric Services messages to an affected device. A successful exploit could allow the attacker to cause a reload of an affected device, which could result in a DoS condition.\r " + "value": "A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated attacker to cause process crashes, which could result in a denial of service (DoS) condition on an affected device. The attack vector is configuration dependent and could be remote or adjacent. For more information about the attack vector, see the Details section of this advisory. The vulnerability is due to insufficient error handling when the affected software parses Cisco Fabric Services messages. An attacker could exploit this vulnerability by sending malicious Cisco Fabric Services messages to an affected device. A successful exploit could allow the attacker to cause a reload of an affected device, which could result in a DoS condition." } ] }, @@ -88,4 +88,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8620.json b/2020/8xxx/CVE-2020-8620.json index e4b6cc4644d..bee8da68280 100644 --- a/2020/8xxx/CVE-2020-8620.json +++ b/2020/8xxx/CVE-2020-8620.json @@ -110,6 +110,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200827-0003/", "url": "https://security.netapp.com/advisory/ntap-20200827-0003/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4468-1", + "url": "https://usn.ubuntu.com/4468-1/" } ] }, diff --git a/2020/8xxx/CVE-2020-8621.json b/2020/8xxx/CVE-2020-8621.json index 6a5dd974c2e..6def9d39c27 100644 --- a/2020/8xxx/CVE-2020-8621.json +++ b/2020/8xxx/CVE-2020-8621.json @@ -111,6 +111,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200827-0003/", "url": "https://security.netapp.com/advisory/ntap-20200827-0003/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4468-1", + "url": "https://usn.ubuntu.com/4468-1/" } ] }, diff --git a/2020/8xxx/CVE-2020-8622.json b/2020/8xxx/CVE-2020-8622.json index 38ccfa6c570..99c0d74fbc5 100644 --- a/2020/8xxx/CVE-2020-8622.json +++ b/2020/8xxx/CVE-2020-8622.json @@ -130,6 +130,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200827-0003/", "url": "https://security.netapp.com/advisory/ntap-20200827-0003/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4468-1", + "url": "https://usn.ubuntu.com/4468-1/" } ] }, diff --git a/2020/8xxx/CVE-2020-8623.json b/2020/8xxx/CVE-2020-8623.json index b3737fe3ffd..c2d6ffdd953 100644 --- a/2020/8xxx/CVE-2020-8623.json +++ b/2020/8xxx/CVE-2020-8623.json @@ -130,6 +130,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200827-0003/", "url": "https://security.netapp.com/advisory/ntap-20200827-0003/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4468-1", + "url": "https://usn.ubuntu.com/4468-1/" } ] }, diff --git a/2020/8xxx/CVE-2020-8624.json b/2020/8xxx/CVE-2020-8624.json index 09e1d7bec49..9c127633b0c 100644 --- a/2020/8xxx/CVE-2020-8624.json +++ b/2020/8xxx/CVE-2020-8624.json @@ -152,6 +152,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200827-0003/", "url": "https://security.netapp.com/advisory/ntap-20200827-0003/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4468-1", + "url": "https://usn.ubuntu.com/4468-1/" } ] },