diff --git a/2021/25xxx/CVE-2021-25318.json b/2021/25xxx/CVE-2021-25318.json index 8504bbee793..cf59d55bf50 100644 --- a/2021/25xxx/CVE-2021-25318.json +++ b/2021/25xxx/CVE-2021-25318.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2021-07-15T00:00:00.000Z", "ID": "CVE-2021-25318", "STATE": "PUBLIC", @@ -50,7 +50,7 @@ "description_data": [ { "lang": "eng", - "value": "A Incorrect Permission Assignment for Critical Resource vulnerability in Rancher allows users in the cluster to modify resources they should not have access to.\nThis issue affects:\nRancher versions prior to 2.5.9 ;\nRancher versions prior to 2.4.16." + "value": "A Incorrect Permission Assignment for Critical Resource vulnerability in Rancher allows users in the cluster to modify resources they should not have access to. This issue affects: Rancher versions prior to 2.5.9 ; Rancher versions prior to 2.4.16." } ] }, @@ -101,4 +101,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25320.json b/2021/25xxx/CVE-2021-25320.json index ffca0f87761..96941c72485 100644 --- a/2021/25xxx/CVE-2021-25320.json +++ b/2021/25xxx/CVE-2021-25320.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2021-07-15T00:00:00.000Z", "ID": "CVE-2021-25320", "STATE": "PUBLIC", @@ -50,7 +50,7 @@ "description_data": [ { "lang": "eng", - "value": "A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks\nThis issue affects:\nRancher versions prior to 2.5.9;\nRancher versions prior to 2.4.16." + "value": "A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This issue affects: Rancher versions prior to 2.5.9; Rancher versions prior to 2.4.16." } ] }, diff --git a/2021/31xxx/CVE-2021-31999.json b/2021/31xxx/CVE-2021-31999.json index 9e5f4289e62..8a8fd75e106 100644 --- a/2021/31xxx/CVE-2021-31999.json +++ b/2021/31xxx/CVE-2021-31999.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2021-07-15T00:00:00.000Z", "ID": "CVE-2021-31999", "STATE": "PUBLIC", @@ -50,7 +50,7 @@ "description_data": [ { "lang": "eng", - "value": "A Reliance on Untrusted Inputs in a Security Decision vulnerability in Rancher allows users in the cluster to act as others users in the cluster by forging the \"Impersonate-User\" or \"Impersonate-Group\" headers.\nThis issue affects:\nRancher versions prior to 2.5.9.\nRancher versions prior to 2.4.16." + "value": "A Reliance on Untrusted Inputs in a Security Decision vulnerability in Rancher allows users in the cluster to act as others users in the cluster by forging the \"Impersonate-User\" or \"Impersonate-Group\" headers. This issue affects: Rancher versions prior to 2.5.9. Rancher versions prior to 2.4.16." } ] }, diff --git a/2021/36xxx/CVE-2021-36750.json b/2021/36xxx/CVE-2021-36750.json new file mode 100644 index 00000000000..b3941e57562 --- /dev/null +++ b/2021/36xxx/CVE-2021-36750.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36750", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36751.json b/2021/36xxx/CVE-2021-36751.json new file mode 100644 index 00000000000..ea5f73dcb40 --- /dev/null +++ b/2021/36xxx/CVE-2021-36751.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36751", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file