diff --git a/2019/19xxx/CVE-2019-19213.json b/2019/19xxx/CVE-2019-19213.json index ffa19460247..3cac02e7eed 100644 --- a/2019/19xxx/CVE-2019-19213.json +++ b/2019/19xxx/CVE-2019-19213.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-19213", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none." } ] } diff --git a/2019/19xxx/CVE-2019-19214.json b/2019/19xxx/CVE-2019-19214.json index edf17573916..a0a525ffe8a 100644 --- a/2019/19xxx/CVE-2019-19214.json +++ b/2019/19xxx/CVE-2019-19214.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-19214", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none." } ] } diff --git a/2019/20xxx/CVE-2019-20809.json b/2019/20xxx/CVE-2019-20809.json index 2959a3e8b36..cccab35ed20 100644 --- a/2019/20xxx/CVE-2019-20809.json +++ b/2019/20xxx/CVE-2019-20809.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-20809", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-20809", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The price oracle in PriceOracle.sol in Compound Finance Compound Price Oracle 1.0 through 2.0 allows a price poster to set an invalid asset price via the setPrice function, and consequently violate the intended limits on price swings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://privacylog.blogspot.com/2019/10/compound-finance-zero-day-prices-can.html", + "refsource": "MISC", + "name": "https://privacylog.blogspot.com/2019/10/compound-finance-zero-day-prices-can.html" } ] } diff --git a/2020/12xxx/CVE-2020-12846.json b/2020/12xxx/CVE-2020-12846.json index ddd3d50b84e..b183c2f8af3 100644 --- a/2020/12xxx/CVE-2020-12846.json +++ b/2020/12xxx/CVE-2020-12846.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-12846", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-12846", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zimbra before 8.8.15 Patch 10 and 9.x before 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact. A user will receive a \"Corrupt File\" error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" + }, + { + "url": "https://wiki.zimbra.com/wiki/Security_Center", + "refsource": "MISC", + "name": "https://wiki.zimbra.com/wiki/Security_Center" + }, + { + "refsource": "CONFIRM", + "name": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3", + "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3" } ] } diff --git a/2020/13xxx/CVE-2020-13597.json b/2020/13xxx/CVE-2020-13597.json index f1bf0da7347..9344e780825 100644 --- a/2020/13xxx/CVE-2020-13597.json +++ b/2020/13xxx/CVE-2020-13597.json @@ -1,18 +1,240 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@tigera.io", + "DATE_PUBLIC": "2020-06-01T16:27:00.000Z", "ID": "CVE-2020-13597", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Calico nodes IPv6 traffic redirection from route advertisment" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Calico", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.14.0" + }, + { + "version_affected": "<=", + "version_value": "3.13.3" + }, + { + "version_affected": "<=", + "version_value": "3.12.1" + }, + { + "version_affected": "<=", + "version_value": "3.11.2" + }, + { + "version_affected": "<=", + "version_value": "3.10.3" + }, + { + "version_affected": "<=", + "version_value": "3.9.5" + }, + { + "version_affected": "<=", + "version_value": "3.8.8" + }, + { + "version_affected": "=", + "version_value": "3.7.x" + }, + { + "version_affected": "=", + "version_value": "3.6.x" + }, + { + "version_affected": "=", + "version_value": "3.5.x" + }, + { + "version_affected": "=", + "version_value": "3.4.x" + }, + { + "version_affected": "=", + "version_value": "3.3.x" + }, + { + "version_affected": "=", + "version_value": "3.2.x" + }, + { + "version_affected": "=", + "version_value": "3.1.x" + }, + { + "version_affected": "=", + "version_value": "3.0.x" + }, + { + "version_affected": "=", + "version_value": "2.6.x" + }, + { + "version_affected": "=", + "version_value": "2.5.x" + }, + { + "version_affected": "=", + "version_value": "2.4.x" + }, + { + "version_affected": "=", + "version_value": "2.3.x" + }, + { + "version_affected": "=", + "version_value": "2.2.x" + }, + { + "version_affected": "=", + "version_value": "2.1.x" + }, + { + "version_affected": "=", + "version_value": "2.0.x" + }, + { + "version_affected": "=", + "version_value": "1.6.x" + }, + { + "version_affected": "=", + "version_value": "1.5.x" + } + ] + } + } + ] + }, + "vendor_name": "Tigera Inc" + }, + { + "product": { + "product_data": [ + { + "product_name": "Calico Enterprise", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "2.8.2" + }, + { + "version_affected": "<=", + "version_value": "2.7.4" + }, + { + "version_affected": "<=", + "version_value": "2.6.2" + }, + { + "version_affected": "=", + "version_value": "2.5.x" + }, + { + "version_affected": "=", + "version_value": "2.4.x" + }, + { + "version_affected": "=", + "version_value": "2.3.x" + }, + { + "version_affected": "=", + "version_value": "2.2.x" + }, + { + "version_affected": "=", + "version_value": "2.1.x" + }, + { + "version_affected": "=", + "version_value": "2.0.x" + } + ] + } + } + ] + }, + "vendor_name": "Tigera Inc" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node\u2019s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-201 Information Exposure Through Sent Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.projectcalico.org/security-bulletins/", + "refsource": "CONFIRM", + "url": "https://www.projectcalico.org/security-bulletins/" + }, + { + "name": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8", + "refsource": "CONFIRM", + "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8" + }, + { + "name": "https://github.com/kubernetes/kubernetes/issues/91507", + "refsource": "CONFIRM", + "url": "https://github.com/kubernetes/kubernetes/issues/91507" + } + ] + }, + "source": { + "advisory": "TTA-2020-001", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13780.json b/2020/13xxx/CVE-2020-13780.json new file mode 100644 index 00000000000..4642967df19 --- /dev/null +++ b/2020/13xxx/CVE-2020-13780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13781.json b/2020/13xxx/CVE-2020-13781.json new file mode 100644 index 00000000000..66d54075592 --- /dev/null +++ b/2020/13xxx/CVE-2020-13781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13782.json b/2020/13xxx/CVE-2020-13782.json new file mode 100644 index 00000000000..3e2a91d9ff4 --- /dev/null +++ b/2020/13xxx/CVE-2020-13782.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13782", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "D-Link DIR-865L Ax 1.20B01 Beta devices allow Command Injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13783.json b/2020/13xxx/CVE-2020-13783.json new file mode 100644 index 00000000000..5697ed4391d --- /dev/null +++ b/2020/13xxx/CVE-2020-13783.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13783", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "D-Link DIR-865L Ax 1.20B01 Beta devices have Cleartext Storage of Sensitive Information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13784.json b/2020/13xxx/CVE-2020-13784.json new file mode 100644 index 00000000000..87f7845ae19 --- /dev/null +++ b/2020/13xxx/CVE-2020-13784.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13784", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "D-Link DIR-865L Ax 1.20B01 Beta devices have a predictable seed in a Pseudo-Random Number Generator." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13785.json b/2020/13xxx/CVE-2020-13785.json new file mode 100644 index 00000000000..ece9d3ed5d8 --- /dev/null +++ b/2020/13xxx/CVE-2020-13785.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13785", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "D-Link DIR-865L Ax 1.20B01 Beta devices have Inadequate Encryption Strength." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13786.json b/2020/13xxx/CVE-2020-13786.json new file mode 100644 index 00000000000..720e2137246 --- /dev/null +++ b/2020/13xxx/CVE-2020-13786.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13786", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "D-Link DIR-865L Ax 1.20B01 Beta devices allow CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13787.json b/2020/13xxx/CVE-2020-13787.json new file mode 100644 index 00000000000..879005001dc --- /dev/null +++ b/2020/13xxx/CVE-2020-13787.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13787", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "D-Link DIR-865L Ax 1.20B01 Beta devices have Cleartext Transmission of Sensitive Information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10174" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13788.json b/2020/13xxx/CVE-2020-13788.json new file mode 100644 index 00000000000..f528f43f17f --- /dev/null +++ b/2020/13xxx/CVE-2020-13788.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13788", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13789.json b/2020/13xxx/CVE-2020-13789.json new file mode 100644 index 00000000000..c64434f9457 --- /dev/null +++ b/2020/13xxx/CVE-2020-13789.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13789", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4035.json b/2020/4xxx/CVE-2020-4035.json index bdff2120622..aa19447d71c 100644 --- a/2020/4xxx/CVE-2020-4035.json +++ b/2020/4xxx/CVE-2020-4035.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "In WatermelonDB (NPM package \"@nozbe/watermelondb\") before versions 0.15.1 and 0.16.2, a maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to become unusable. This may happen in apps that don't validate IDs (valid IDs are `/^[a-zA-Z0-9_-.]+$/`) and use Watermelon Sync or low-level `database.adapter.destroyDeletedRecords` method.\n\nThe integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage.\n\nNo way to breach confidentiality with this vulnerability is known. Full exploitation of SQL Injection is mitigated, because it's not possible to nest an insert/update query inside a delete query in SQLite, and it's not possible to pass a semicolon-separated second query. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized.\n\nIt's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app. \n\nThis is patched in versions 0.15.1, 0.16.2, and 0.16.1-fix" + "value": "In WatermelonDB (NPM package \"@nozbe/watermelondb\") before versions 0.15.1 and 0.16.2, a maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to become unusable. This may happen in apps that don't validate IDs (valid IDs are `/^[a-zA-Z0-9_-.]+$/`) and use Watermelon Sync or low-level `database.adapter.destroyDeletedRecords` method. The integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage. No way to breach confidentiality with this vulnerability is known. Full exploitation of SQL Injection is mitigated, because it's not possible to nest an insert/update query inside a delete query in SQLite, and it's not possible to pass a semicolon-separated second query. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized. It's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app. This is patched in versions 0.15.1, 0.16.2, and 0.16.1-fix" } ] },