diff --git a/2019/14xxx/CVE-2019-14477.json b/2019/14xxx/CVE-2019-14477.json new file mode 100644 index 00000000000..12ee98c3c01 --- /dev/null +++ b/2019/14xxx/CVE-2019-14477.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14477", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "AdRem NetCrunch 10.6.0.4587 has Improper Credential Storage since the internal user database is readable by low-privileged users and passwords in the database are weakly encoded or encrypted." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.adremsoft.com/support/", + "refsource": "MISC", + "name": "https://www.adremsoft.com/support/" + }, + { + "refsource": "MISC", + "name": "https://compass-security.com/fileadmin/Research/Advisories/2020-11_CSNC-2019-012_AdRem_NetCrunch_Improper_Credential_Storage.txt", + "url": "https://compass-security.com/fileadmin/Research/Advisories/2020-11_CSNC-2019-012_AdRem_NetCrunch_Improper_Credential_Storage.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14480.json b/2019/14xxx/CVE-2019-14480.json new file mode 100644 index 00000000000..cab79916c50 --- /dev/null +++ b/2019/14xxx/CVE-2019-14480.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14480", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "AdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.adremsoft.com/support/", + "refsource": "MISC", + "name": "https://www.adremsoft.com/support/" + }, + { + "refsource": "MISC", + "name": "https://compass-security.com/fileadmin/Research/Advisories/2020-14_CSNC-2019-015_AdRem_NetCrunch_Improper_Session_Handling.txt", + "url": "https://compass-security.com/fileadmin/Research/Advisories/2020-14_CSNC-2019-015_AdRem_NetCrunch_Improper_Session_Handling.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14482.json b/2019/14xxx/CVE-2019-14482.json new file mode 100644 index 00000000000..d0a0b85ab04 --- /dev/null +++ b/2019/14xxx/CVE-2019-14482.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14482", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "AdRem NetCrunch 10.6.0.4587 has a hardcoded SSL private key vulnerability in the NetCrunch web client. The same hardcoded SSL private key is used across different customers' installations when no other SSL certificate is installed, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.adremsoft.com/support/", + "refsource": "MISC", + "name": "https://www.adremsoft.com/support/" + }, + { + "refsource": "MISC", + "name": "https://compass-security.com/fileadmin/Research/Advisories/2020-16_CSNC-2019-017_AdRem_NetCrunch_Hardcoded_SSL_Private_Key.txt", + "url": "https://compass-security.com/fileadmin/Research/Advisories/2020-16_CSNC-2019-017_AdRem_NetCrunch_Hardcoded_SSL_Private_Key.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14483.json b/2019/14xxx/CVE-2019-14483.json new file mode 100644 index 00000000000..2c052a0db98 --- /dev/null +++ b/2019/14xxx/CVE-2019-14483.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14483", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "AdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Windows passwords stored in the credential manager." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.adremsoft.com/support/", + "refsource": "MISC", + "name": "https://www.adremsoft.com/support/" + }, + { + "refsource": "MISC", + "name": "https://compass-security.com/fileadmin/Research/Advisories/2020-17_CSNC-2019-018_AdRem_NetCrunch_Credentials_Disclosure.txt", + "url": "https://compass-security.com/fileadmin/Research/Advisories/2020-17_CSNC-2019-018_AdRem_NetCrunch_Credentials_Disclosure.txt" + } + ] + } +} \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26198.json b/2020/26xxx/CVE-2020-26198.json index 6a0cf670bf1..2021a61d663 100644 --- a/2020/26xxx/CVE-2020-26198.json +++ b/2020/26xxx/CVE-2020-26198.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2020-12-15", - "ID": "CVE-2020-26198", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2020-12-15", + "ID": "CVE-2020-26198", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Integrated Dell Remote Access Controller (iDRAC)", + "product_name": "Integrated Dell Remote Access Controller (iDRAC)", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "4.32.10.00 and 4.40.00.00" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell EMC iDRAC9 versions prior to 4.32.10.00 and 4.40.00.00 contain a reflected cross-site scripting vulnerability in the iDRAC9 web application. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim\u2019s browser by tricking a victim in to following a specially crafted link." } ] - }, + }, "impact": { "cvss": { - "baseScore": 6.1, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability", + "name": "https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability" } ] } diff --git a/2020/28xxx/CVE-2020-28970.json b/2020/28xxx/CVE-2020-28970.json index 0923c41d323..a077f43367b 100644 --- a/2020/28xxx/CVE-2020-28970.json +++ b/2020/28xxx/CVE-2020-28970.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115", "url": "https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1448/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1448/" } ] } diff --git a/2020/5xxx/CVE-2020-5359.json b/2020/5xxx/CVE-2020-5359.json index 0c3173cefe8..49632665761 100644 --- a/2020/5xxx/CVE-2020-5359.json +++ b/2020/5xxx/CVE-2020-5359.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2020-12-15", - "ID": "CVE-2020-5359", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2020-12-15", + "ID": "CVE-2020-5359", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Dell BSAFE Micro Edition Suite", + "product_name": "Dell BSAFE Micro Edition Suite", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "4.5" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to an Unchecked Return Value Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to modify and corrupt the encrypted data." } ] - }, + }, "impact": { "cvss": { - "baseScore": 5.8, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-544: Missing Standardized Error Handling Mechanism" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities", + "name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" } ] } diff --git a/2020/5xxx/CVE-2020-5360.json b/2020/5xxx/CVE-2020-5360.json index daa2a8d9289..341f4e22c25 100644 --- a/2020/5xxx/CVE-2020-5360.json +++ b/2020/5xxx/CVE-2020-5360.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2020-05-18", - "ID": "CVE-2020-5360", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2020-05-18", + "ID": "CVE-2020-5360", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Dell BSAFE Micro Edition Suite", + "product_name": "Dell BSAFE Micro Edition Suite", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "4.5" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to a Buffer Under-Read Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability resulting in undefined behaviour, or a crash of the affected systems." } ] - }, + }, "impact": { "cvss": { - "baseScore": 7.5, - "baseSeverity": "High", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-127: Buffer Under-read" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities", + "name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" } ] }