diff --git a/2018/10xxx/CVE-2018-10863.json b/2018/10xxx/CVE-2018-10863.json index d7f6109f6aa..d5cace8842c 100644 --- a/2018/10xxx/CVE-2018-10863.json +++ b/2018/10xxx/CVE-2018-10863.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-10863", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-10863", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "redhat-certification", + "version": { + "version_data": [ + { + "version_value": "redhat-certification 7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-552" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1594122", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594122" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It has been discovered that redhat-certification is not properly configured and it lists all files and directories in the /var/www/rhcert/store/transfer directory through the /rhcert-transfer URL. An unauthorized attacker may use this flaw to gather sensible information. This flaw affects redhat-certification version 7." } ] } diff --git a/2018/10xxx/CVE-2018-10865.json b/2018/10xxx/CVE-2018-10865.json index 56ca2564883..6050af6f606 100644 --- a/2018/10xxx/CVE-2018-10865.json +++ b/2018/10xxx/CVE-2018-10865.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-10865", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-10865", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "redhat-certification", + "version": { + "version_data": [ + { + "version_value": "redhat-certification 7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593631", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593631" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It has been discovered that redhat-certification does not perform an authorization check and allows an unauthenticated user to call a \"restart\" RPC method on any host accessible by the system. An attacker could use this flaw to send requests to port 8009 of any host or to keep restarting the RHCertD daemon on a host of another customer. This flaw affects redhat-certification version 7." } ] } diff --git a/2018/10xxx/CVE-2018-10866.json b/2018/10xxx/CVE-2018-10866.json index 0f4a474e74e..289c489af68 100644 --- a/2018/10xxx/CVE-2018-10866.json +++ b/2018/10xxx/CVE-2018-10866.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-10866", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-10866", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "redhat-certification", + "version": { + "version_data": [ + { + "version_value": "redhat-certification 7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It has been discovered that redhat-certification does not perform an authorization check and it allows an unauthenticated user to remove a \"system\" file, that is an xml file with host related information, not belonging to him. This flaw affects redhat-certification version 7." } ] } diff --git a/2018/10xxx/CVE-2018-10867.json b/2018/10xxx/CVE-2018-10867.json index 4e7d662207f..93183e60d88 100644 --- a/2018/10xxx/CVE-2018-10867.json +++ b/2018/10xxx/CVE-2018-10867.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-10867", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-10867", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "redhat-certification", + "version": { + "version_data": [ + { + "version_value": "redhat-certification 7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-552" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It has been discovered that redhat-certification does not restrict file access in the /update/results page. A remote attacker could use this vulnerability to remove any file accessible by the user which is running httpd. This flaw affects redhat-certification version 7." } ] } diff --git a/2018/10xxx/CVE-2018-10868.json b/2018/10xxx/CVE-2018-10868.json index 54672ebd1d9..ba27759e167 100644 --- a/2018/10xxx/CVE-2018-10868.json +++ b/2018/10xxx/CVE-2018-10868.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-10868", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-10868", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "redhat-certification", + "version": { + "version_data": [ + { + "version_value": "redhat-certification 7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-776" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It has been discovered that redhat-certification does not properly limit the number of recursive definitions of entities in XML documents while parsing the status of a host. A remote attacker could use this vulnerability to consume all the memory of the server and cause a Denial of Service. This flaw affects redhat-certification version 7." } ] } diff --git a/2018/16xxx/CVE-2018-16494.json b/2018/16xxx/CVE-2018-16494.json index 3247ab1b9eb..ded5371f606 100644 --- a/2018/16xxx/CVE-2018-16494.json +++ b/2018/16xxx/CVE-2018-16494.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-16494", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-16494", + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa VOS", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Temporary File (CWE-377)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168191", + "url": "https://hackerone.com/reports/1168191" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In VOS and overly permissive \"umask\" may allow for authorized users of the server to gain unauthorized access through insecure file permissions that can result in an arbitrary read, write, or execution of newly created files and directories. Insecure umask setting was present throughout the Versa servers." } ] } diff --git a/2018/16xxx/CVE-2018-16495.json b/2018/16xxx/CVE-2018-16495.json index 0d8298f2115..a2c6183d1d2 100644 --- a/2018/16xxx/CVE-2018-16495.json +++ b/2018/16xxx/CVE-2018-16495.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-16495", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-16495", + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa VOS", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Session Fixation (CWE-384)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168192", + "url": "https://hackerone.com/reports/1168192" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In VOS user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after the user successfully logs into the application. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with." } ] } diff --git a/2018/16xxx/CVE-2018-16496.json b/2018/16xxx/CVE-2018-16496.json index 91c4c7318ef..7f1d3c2246d 100644 --- a/2018/16xxx/CVE-2018-16496.json +++ b/2018/16xxx/CVE-2018-16496.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-16496", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-16496", + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa Director", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authentication - Generic (CWE-287)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168193", + "url": "https://hackerone.com/reports/1168193" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Versa Director, the un-authentication request found." } ] } diff --git a/2018/16xxx/CVE-2018-16497.json b/2018/16xxx/CVE-2018-16497.json index 1ccd821fec3..304262a9b35 100644 --- a/2018/16xxx/CVE-2018-16497.json +++ b/2018/16xxx/CVE-2018-16497.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-16497", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-16497", + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa Analytics", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Privilege Management (CWE-269)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168194", + "url": "https://hackerone.com/reports/1168194" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Versa Analytics, the cron jobs are used for scheduling tasks by executing commands at specific dates and times on the server. If the job is run as the user root, there is a potential privilege escalation vulnerability. In this case, the job runs a script as root that is writable by users who are members of the versa group." } ] } diff --git a/2018/16xxx/CVE-2018-16498.json b/2018/16xxx/CVE-2018-16498.json index 5d2e61ac0f3..4031faf508d 100644 --- a/2018/16xxx/CVE-2018-16498.json +++ b/2018/16xxx/CVE-2018-16498.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-16498", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-16498", + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa Director", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cleartext Storage of Sensitive Information (CWE-312)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168195", + "url": "https://hackerone.com/reports/1168195" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Versa Director, the unencrypted backup files stored on the Versa deployment contain credentials stored within configuration files. These credentials are for various application components such as SNMP, and SSL and Trust keystores." } ] } diff --git a/2018/16xxx/CVE-2018-16499.json b/2018/16xxx/CVE-2018-16499.json index 01348c0d85b..27196f573d6 100644 --- a/2018/16xxx/CVE-2018-16499.json +++ b/2018/16xxx/CVE-2018-16499.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-16499", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-16499", + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa VOS", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Inadequate Encryption Strength (CWE-326)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168196", + "url": "https://hackerone.com/reports/1168196" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In VOS compromised, an attacker at network endpoints can possibly view communications between an unsuspecting user and the service using man-in-the-middle attacks. Usage of unapproved SSH encryption protocols or cipher suites also violates the Data Protection TSR (Technical Security Requirements)." } ] } diff --git a/2019/25xxx/CVE-2019-25029.json b/2019/25xxx/CVE-2019-25029.json index cc1f80448b9..5026556060f 100644 --- a/2019/25xxx/CVE-2019-25029.json +++ b/2019/25xxx/CVE-2019-25029.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-25029", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa Director", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection - Generic (CWE-77)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168198", + "url": "https://hackerone.com/reports/1168198" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Versa Director, the command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation." } ] } diff --git a/2019/25xxx/CVE-2019-25030.json b/2019/25xxx/CVE-2019-25030.json index 18ce4b2e3e5..0fc88056af2 100644 --- a/2019/25xxx/CVE-2019-25030.json +++ b/2019/25xxx/CVE-2019-25030.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-25030", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Versa Director, Versa Analytics, Versa VOS", + "version": { + "version_data": [ + { + "version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficiently Protected Credentials (CWE-522)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1168197", + "url": "https://hackerone.com/reports/1168197" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Versa Director, Versa Analytics and VOS, Passwords are not hashed using an adaptive cryptographic hash function or key derivation function prior to storage. Popular hashing algorithms based on the Merkle-Damgardconstruction (such as MD5 and SHA-1) alone are insufficient in thwarting password cracking. Attackers can generate and use precomputed hashes for all possible password character combinations (commonly referred to as \"rainbow tables\") relatively quickly. The use of adaptive hashing algorithms such asscryptorbcryptor Key-Derivation Functions (i.e.PBKDF2) to hash passwords make generation of such rainbow tables computationally infeasible." } ] } diff --git a/2020/15xxx/CVE-2020-15076.json b/2020/15xxx/CVE-2020-15076.json index 0f4c53baf85..c471a262615 100644 --- a/2020/15xxx/CVE-2020-15076.json +++ b/2020/15xxx/CVE-2020-15076.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15076", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@openvpn.net", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Private Tunnel", + "version": { + "version_data": [ + { + "version_value": "3.0.1 and prior versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-61: UNIX Symbolic Link (Symlink) Following" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://swupdate.openvpn.net/downloads/privatetunnel/changelog.txt", + "url": "https://swupdate.openvpn.net/downloads/privatetunnel/changelog.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Private Tunnel installer for macOS version 3.0.1 and older versions may corrupt system critical files it should not have access via symlinks in /tmp." } ] } diff --git a/2020/36xxx/CVE-2020-36221.json b/2020/36xxx/CVE-2020-36221.json index 5d99baf6285..8cd0e78dbdd 100644 --- a/2020/36xxx/CVE-2020-36221.json +++ b/2020/36xxx/CVE-2020-36221.json @@ -101,6 +101,26 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212531", "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36222.json b/2020/36xxx/CVE-2020-36222.json index 9a30a5c8d4c..a346ca94474 100644 --- a/2020/36xxx/CVE-2020-36222.json +++ b/2020/36xxx/CVE-2020-36222.json @@ -106,6 +106,26 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212531", "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36223.json b/2020/36xxx/CVE-2020-36223.json index 6a4ab0b51b7..070ffd01244 100644 --- a/2020/36xxx/CVE-2020-36223.json +++ b/2020/36xxx/CVE-2020-36223.json @@ -91,6 +91,26 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212531", "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36224.json b/2020/36xxx/CVE-2020-36224.json index 2b69e08dc28..0656a277446 100644 --- a/2020/36xxx/CVE-2020-36224.json +++ b/2020/36xxx/CVE-2020-36224.json @@ -106,6 +106,26 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212531", "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36225.json b/2020/36xxx/CVE-2020-36225.json index ad7e796f9e9..0c7ba18cdbc 100644 --- a/2020/36xxx/CVE-2020-36225.json +++ b/2020/36xxx/CVE-2020-36225.json @@ -101,6 +101,31 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212529", "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36226.json b/2020/36xxx/CVE-2020-36226.json index 53d75ac6ea1..58cd280ba59 100644 --- a/2020/36xxx/CVE-2020-36226.json +++ b/2020/36xxx/CVE-2020-36226.json @@ -106,6 +106,26 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212531", "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36227.json b/2020/36xxx/CVE-2020-36227.json index b7672deb3ba..7230c6a8c67 100644 --- a/2020/36xxx/CVE-2020-36227.json +++ b/2020/36xxx/CVE-2020-36227.json @@ -86,6 +86,31 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212529", "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36228.json b/2020/36xxx/CVE-2020-36228.json index 5dc47123e2d..659f309b829 100644 --- a/2020/36xxx/CVE-2020-36228.json +++ b/2020/36xxx/CVE-2020-36228.json @@ -86,6 +86,31 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212529", "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36229.json b/2020/36xxx/CVE-2020-36229.json index 72d1d8077cb..ea70d27512a 100644 --- a/2020/36xxx/CVE-2020-36229.json +++ b/2020/36xxx/CVE-2020-36229.json @@ -86,6 +86,31 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212529", "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2020/36xxx/CVE-2020-36230.json b/2020/36xxx/CVE-2020-36230.json index f334965a383..4d2a7afad58 100644 --- a/2020/36xxx/CVE-2020-36230.json +++ b/2020/36xxx/CVE-2020-36230.json @@ -91,6 +91,26 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212531", "url": "https://support.apple.com/kb/HT212531" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212530", + "url": "https://support.apple.com/kb/HT212530" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/May/64" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave", + "url": "http://seclists.org/fulldisclosure/2021/May/65" } ] } diff --git a/2021/23xxx/CVE-2021-23841.json b/2021/23xxx/CVE-2021-23841.json index 27e405520cb..4cd9253d32a 100644 --- a/2021/23xxx/CVE-2021-23841.json +++ b/2021/23xxx/CVE-2021-23841.json @@ -129,6 +129,21 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212534", "url": "https://support.apple.com/kb/HT212534" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", + "url": "http://seclists.org/fulldisclosure/2021/May/70" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-5 Safari 14.1.1", + "url": "http://seclists.org/fulldisclosure/2021/May/68" + }, + { + "refsource": "FULLDISC", + "name": "20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6", + "url": "http://seclists.org/fulldisclosure/2021/May/67" } ] } diff --git a/2021/31xxx/CVE-2021-31209.json b/2021/31xxx/CVE-2021-31209.json index 34f825cbf9a..a25fa01f2ff 100644 --- a/2021/31xxx/CVE-2021-31209.json +++ b/2021/31xxx/CVE-2021-31209.json @@ -96,6 +96,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-615/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-615/" } ] }