From b1b924c8fe8e1f6bcab6731447068ca3419e21e9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 19 Jan 2021 20:02:00 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14409.json | 61 ++++++++++++++++++++++++++++++---- 2020/14xxx/CVE-2020-14410.json | 61 ++++++++++++++++++++++++++++++---- 2020/17xxx/CVE-2020-17527.json | 20 +++++++++++ 2020/1xxx/CVE-2020-1456.json | 10 ++++++ 2020/27xxx/CVE-2020-27670.json | 5 +++ 2020/27xxx/CVE-2020-27671.json | 5 +++ 2020/27xxx/CVE-2020-27672.json | 5 +++ 2021/21xxx/CVE-2021-21263.json | 2 +- 8 files changed, 156 insertions(+), 13 deletions(-) diff --git a/2020/14xxx/CVE-2020-14409.json b/2020/14xxx/CVE-2020-14409.json index 0ea4e6f7e1d..7021c7ab497 100644 --- a/2020/14xxx/CVE-2020-14409.json +++ b/2020/14xxx/CVE-2020-14409.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14409", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14409", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.libsdl.org/show_bug.cgi?id=5200", + "url": "https://bugzilla.libsdl.org/show_bug.cgi?id=5200" + }, + { + "refsource": "MISC", + "name": "https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9", + "url": "https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9" } ] } diff --git a/2020/14xxx/CVE-2020-14410.json b/2020/14xxx/CVE-2020-14410.json index f6edf275e9a..2e176523399 100644 --- a/2020/14xxx/CVE-2020-14410.json +++ b/2020/14xxx/CVE-2020-14410.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14410", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14410", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SDL (Simple DirectMedia Layer) through 2.0.12 has a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.libsdl.org/show_bug.cgi?id=5200", + "url": "https://bugzilla.libsdl.org/show_bug.cgi?id=5200" + }, + { + "refsource": "MISC", + "name": "https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9", + "url": "https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9" } ] } diff --git a/2020/17xxx/CVE-2020-17527.json b/2020/17xxx/CVE-2020-17527.json index ff70670478d..f9c9b0dfed3 100644 --- a/2020/17xxx/CVE-2020-17527.json +++ b/2020/17xxx/CVE-2020-17527.json @@ -143,6 +143,26 @@ "refsource": "MLIST", "name": "[tomcat-dev] 20210114 svn commit: r1885488 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml", "url": "https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20210119 Re: [SECURITY][CORRECTION] CVE-2020-17527 Apache Tomcat HTTP/2 Request header mix-up", + "url": "https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-dev] 20210119 Re: [SECURITY][CORRECTION] CVE-2020-17527 Apache Tomcat HTTP/2 Request header mix-up", + "url": "https://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-announce] 20210119 Re: [SECURITY][CORRECTION] CVE-2020-17527 Apache Tomcat HTTP/2 Request header mix-up", + "url": "https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20210119 Re: [SECURITY][CORRECTION] CVE-2020-17527 Apache Tomcat HTTP/2 Request header mix-up", + "url": "https://lists.apache.org/thread.html/rbba08c4dcef3603e36276d49adda8eedbe458c5104314b4038f697e1@%3Cusers.tomcat.apache.org%3E" } ] }, diff --git a/2020/1xxx/CVE-2020-1456.json b/2020/1xxx/CVE-2020-1456.json index 5c5d67ae93d..f67e39ef096 100644 --- a/2020/1xxx/CVE-2020-1456.json +++ b/2020/1xxx/CVE-2020-1456.json @@ -72,6 +72,16 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1456", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1456" + }, + { + "refsource": "MISC", + "name": "https://slashcrypto.org/2021/01/15/CVE-2020-1456/", + "url": "https://slashcrypto.org/2021/01/15/CVE-2020-1456/" + }, + { + "refsource": "MISC", + "name": "https://it-sec.de/ger/Aktuelles-Termine/it.sec-blog/it.sec-Research-Team-findet-unbekannte-Schwachstelle-in-Microsoft-Office-SharePoint", + "url": "https://it-sec.de/ger/Aktuelles-Termine/it.sec-blog/it.sec-Research-Team-findet-unbekannte-Schwachstelle-in-Microsoft-Office-SharePoint" } ] } diff --git a/2020/27xxx/CVE-2020-27670.json b/2020/27xxx/CVE-2020-27670.json index 6e2dbd22809..2b10af4148a 100644 --- a/2020/27xxx/CVE-2020-27670.json +++ b/2020/27xxx/CVE-2020-27670.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "http://xenbits.xen.org/xsa/advisory-347.html", + "url": "http://xenbits.xen.org/xsa/advisory-347.html" + }, { "url": "https://xenbits.xen.org/xsa/advisory-347.html", "refsource": "MISC", diff --git a/2020/27xxx/CVE-2020-27671.json b/2020/27xxx/CVE-2020-27671.json index fdd922dbe87..168b2cf6260 100644 --- a/2020/27xxx/CVE-2020-27671.json +++ b/2020/27xxx/CVE-2020-27671.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "http://xenbits.xen.org/xsa/advisory-346.html", + "url": "http://xenbits.xen.org/xsa/advisory-346.html" + }, { "url": "https://xenbits.xen.org/xsa/advisory-346.html", "refsource": "MISC", diff --git a/2020/27xxx/CVE-2020-27672.json b/2020/27xxx/CVE-2020-27672.json index ba1d605f4b0..99b65b64419 100644 --- a/2020/27xxx/CVE-2020-27672.json +++ b/2020/27xxx/CVE-2020-27672.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "http://xenbits.xen.org/xsa/advisory-345.html", + "url": "http://xenbits.xen.org/xsa/advisory-345.html" + }, { "url": "https://xenbits.xen.org/xsa/advisory-345.html", "refsource": "MISC", diff --git a/2021/21xxx/CVE-2021-21263.json b/2021/21xxx/CVE-2021-21263.json index 67da9e41f4e..f0e424f7a0f 100644 --- a/2021/21xxx/CVE-2021-21263.json +++ b/2021/21xxx/CVE-2021-21263.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "Laravel is a web application framework. Versions of Laravel before 6.20.11, 7.30.2 and 8.22.1 contain a query binding exploitation. This same exploit applies to the illuminate/database package which is used by Laravel.\n\nIf a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results." + "value": "Laravel is a web application framework. Versions of Laravel before 6.20.11, 7.30.2 and 8.22.1 contain a query binding exploitation. This same exploit applies to the illuminate/database package which is used by Laravel. If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results." } ] },