From df9e47715ceed928af160f9e9721e7fdbe7de361 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 7 Apr 2020 18:01:17 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2013/7xxx/CVE-2013-7488.json | 62 ++++++++++++++++++++++ 2015/9xxx/CVE-2015-9544.json | 77 +++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9545.json | 77 +++++++++++++++++++++++++++ 2019/13xxx/CVE-2019-13554.json | 62 ++++++++++++++++++++++ 2019/13xxx/CVE-2019-13559.json | 62 ++++++++++++++++++++++ 2019/17xxx/CVE-2019-17657.json | 95 ++++++++++++++++++++++++++++++++++ 2020/11xxx/CVE-2020-11610.json | 67 ++++++++++++++++++++++++ 2020/11xxx/CVE-2020-11611.json | 67 ++++++++++++++++++++++++ 2020/11xxx/CVE-2020-11612.json | 72 ++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6974.json | 50 ++++++++++++++++-- 10 files changed, 688 insertions(+), 3 deletions(-) create mode 100644 2013/7xxx/CVE-2013-7488.json create mode 100644 2015/9xxx/CVE-2015-9544.json create mode 100644 2015/9xxx/CVE-2015-9545.json create mode 100644 2019/13xxx/CVE-2019-13554.json create mode 100644 2019/13xxx/CVE-2019-13559.json create mode 100644 2019/17xxx/CVE-2019-17657.json create mode 100644 2020/11xxx/CVE-2020-11610.json create mode 100644 2020/11xxx/CVE-2020-11611.json create mode 100644 2020/11xxx/CVE-2020-11612.json diff --git a/2013/7xxx/CVE-2013-7488.json b/2013/7xxx/CVE-2013-7488.json new file mode 100644 index 00000000000..fd5e8e88b86 --- /dev/null +++ b/2013/7xxx/CVE-2013-7488.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2013-7488", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gbarr/perl-Convert-ASN1/issues/14", + "refsource": "MISC", + "name": "https://github.com/gbarr/perl-Convert-ASN1/issues/14" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9544.json b/2015/9xxx/CVE-2015-9544.json new file mode 100644 index 00000000000..99f5c516479 --- /dev/null +++ b/2015/9xxx/CVE-2015-9544.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9544", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe", + "refsource": "MISC", + "name": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe" + }, + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage/issues/17", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage/issues/17" + }, + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage/pull/19", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage/pull/19" + }, + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9545.json b/2015/9xxx/CVE-2015-9545.json new file mode 100644 index 00000000000..a94382bc38b --- /dev/null +++ b/2015/9xxx/CVE-2015-9545.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9545", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage/issues/17", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage/issues/17" + }, + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage/pull/19", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage/pull/19" + }, + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage" + }, + { + "url": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client", + "refsource": "MISC", + "name": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13554.json b/2019/13xxx/CVE-2019-13554.json new file mode 100644 index 00000000000..b18f2e357a0 --- /dev/null +++ b/2019/13xxx/CVE-2019-13554.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-13554", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GE Mark VIe Controller", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authorization CWE-285" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.us-cert.gov/ics/advisories/icsa-19-281-02", + "url": "https://www.us-cert.gov/ics/advisories/icsa-19-281-02" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "GE Mark VIe Controller has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials. GE recommends that users disable the Telnet service." + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13559.json b/2019/13xxx/CVE-2019-13559.json new file mode 100644 index 00000000000..8e8b1876a91 --- /dev/null +++ b/2019/13xxx/CVE-2019-13559.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-13559", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GE Mark VIe Controller", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Hard-coded credentials CWE-798" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.us-cert.gov/ics/advisories/icsa-19-281-02", + "url": "https://www.us-cert.gov/ics/advisories/icsa-19-281-02" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "GE Mark VIe Controller is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and configuration instructions immediately available to the end user. The bulk of controllers go into applications requiring the GE commissioning engineer to change default configurations during the installation process. GE recommends that users reset controller passwords during installation in the operating environment." + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17657.json b/2019/17xxx/CVE-2019-17657.json new file mode 100644 index 00000000000..e57ce35e0f8 --- /dev/null +++ b/2019/17xxx/CVE-2019-17657.json @@ -0,0 +1,95 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-17657", + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiSwitch", + "version": { + "version_data": [ + { + "version_value": "below 3.6.11" + }, + { + "version_value": "6.0.6 and 6.2.2" + } + ] + } + }, + { + "product_name": "FortiAnalyzer", + "version": { + "version_data": [ + { + "version_value": "below 6.2.3" + } + ] + } + }, + { + "product_name": "FortiManager", + "version": { + "version_data": [ + { + "version_value": "below 6.2.3" + } + ] + } + }, + { + "product_name": "FortiAP-S/W2", + "version": { + "version_data": [ + { + "version_value": "below 6.2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/psirt/FG-IR-19-013", + "url": "https://fortiguard.com/psirt/FG-IR-19-013" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An Uncontrolled Resource Consumption vulnerability in Fortinet FortiSwitch below 3.6.11, 6.0.6 and 6.2.2, FortiAnalyzer below 6.2.3, FortiManager below 6.2.3 and FortiAP-S/W2 below 6.2.2 may allow an attacker to cause admin webUI denial of service (DoS) via handling special crafted HTTP requests/responses in pieces slowly, as demonstrated by Slow HTTP DoS Attacks." + } + ] + } +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11610.json b/2020/11xxx/CVE-2020-11610.json new file mode 100644 index 00000000000..573c63535fe --- /dev/null +++ b/2020/11xxx/CVE-2020-11610.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-11610", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the \"magical iframe\" and receive the messages that the \"magical iframe\" sends." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage" + }, + { + "url": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe", + "refsource": "MISC", + "name": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe" + } + ] + } +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11611.json b/2020/11xxx/CVE-2020-11611.json new file mode 100644 index 00000000000..474071c12d0 --- /dev/null +++ b/2020/11xxx/CVE-2020-11611.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-11611", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ofirdagan/cross-domain-local-storage", + "refsource": "MISC", + "name": "https://github.com/ofirdagan/cross-domain-local-storage" + }, + { + "url": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client", + "refsource": "MISC", + "name": "https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client" + } + ] + } +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11612.json b/2020/11xxx/CVE-2020-11612.json new file mode 100644 index 00000000000..76e799333f7 --- /dev/null +++ b/2020/11xxx/CVE-2020-11612.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-11612", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/netty/netty/issues/6168", + "refsource": "MISC", + "name": "https://github.com/netty/netty/issues/6168" + }, + { + "url": "https://github.com/netty/netty/pull/9924", + "refsource": "MISC", + "name": "https://github.com/netty/netty/pull/9924" + }, + { + "url": "https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final", + "refsource": "MISC", + "name": "https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6974.json b/2020/6xxx/CVE-2020-6974.json index 4435e0b2099..3c8a487f1dd 100644 --- a/2020/6xxx/CVE-2020-6974.json +++ b/2020/6xxx/CVE-2020-6974.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6974", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Honeywell Notifier Web Server (NWS)", + "version": { + "version_data": [ + { + "version_value": "Version 3.50 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "PATH TRAVERSAL CWE-22" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.us-cert.gov/ics/advisories/icsa-20-051-03", + "url": "https://www.us-cert.gov/ics/advisories/icsa-20-051-03" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which allows an attacker to bypass access to restricted directories. Honeywell has released a firmware update to address the problem." } ] }