From e4423a006b73538bcbeec75c91211292f12b09e3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 17 May 2021 22:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/18xxx/CVE-2020-18194.json | 56 +++++++++++++++++++++++++++---- 2020/18xxx/CVE-2020-18195.json | 56 +++++++++++++++++++++++++++---- 2020/18xxx/CVE-2020-18198.json | 56 +++++++++++++++++++++++++++---- 2020/21xxx/CVE-2020-21831.json | 61 ++++++++++++++++++++++++++++++---- 2020/21xxx/CVE-2020-21842.json | 61 ++++++++++++++++++++++++++++++---- 2020/21xxx/CVE-2020-21843.json | 61 ++++++++++++++++++++++++++++++---- 2020/21xxx/CVE-2020-21844.json | 61 ++++++++++++++++++++++++++++++---- 2020/24xxx/CVE-2020-24755.json | 56 +++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36363.json | 18 ++++++++++ 2021/33xxx/CVE-2021-33054.json | 18 ++++++++++ 2021/33xxx/CVE-2021-33055.json | 18 ++++++++++ 11 files changed, 474 insertions(+), 48 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36363.json create mode 100644 2021/33xxx/CVE-2021-33054.json create mode 100644 2021/33xxx/CVE-2021-33055.json diff --git a/2020/18xxx/CVE-2020-18194.json b/2020/18xxx/CVE-2020-18194.json index c55c831cb57..d0348e12a63 100644 --- a/2020/18xxx/CVE-2020-18194.json +++ b/2020/18xxx/CVE-2020-18194.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18194", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18194", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) in emlog v6.0.0 allows remote attackers to execute arbitrary code by adding a crafted script as a link to a new blog post." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.lurbk.com/lur1823.html", + "refsource": "MISC", + "name": "https://www.lurbk.com/lur1823.html" } ] } diff --git a/2020/18xxx/CVE-2020-18195.json b/2020/18xxx/CVE-2020-18195.json index 906bb5bd343..692594da50a 100644 --- a/2020/18xxx/CVE-2020-18195.json +++ b/2020/18xxx/CVE-2020-18195.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18195", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18195", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete a specific article via the component \" /admin.php?action=page.\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pluck-cms/pluck/issues/69", + "refsource": "MISC", + "name": "https://github.com/pluck-cms/pluck/issues/69" } ] } diff --git a/2020/18xxx/CVE-2020-18198.json b/2020/18xxx/CVE-2020-18198.json index a0556727e5d..f766c0d5d52 100644 --- a/2020/18xxx/CVE-2020-18198.json +++ b/2020/18xxx/CVE-2020-18198.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18198", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18198", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete specific images via the component \" /admin.php?action=images.\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pluck-cms/pluck/issues/69", + "refsource": "MISC", + "name": "https://github.com/pluck-cms/pluck/issues/69" } ] } diff --git a/2020/21xxx/CVE-2020-21831.json b/2020/21xxx/CVE-2020-21831.json index 5dd55d7a7d8..50568a3e8fc 100644 --- a/2020/21xxx/CVE-2020-21831.json +++ b/2020/21xxx/CVE-2020-21831.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21831", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21831", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_handles ../../src/decode.c:2637." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://gnu.com", + "refsource": "MISC", + "name": "http://gnu.com" + }, + { + "url": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267", + "refsource": "MISC", + "name": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267" } ] } diff --git a/2020/21xxx/CVE-2020-21842.json b/2020/21xxx/CVE-2020-21842.json index 1c3c1643c8f..e36ada0384a 100644 --- a/2020/21xxx/CVE-2020-21842.json +++ b/2020/21xxx/CVE-2020-21842.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21842", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21842", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_revhistory ../../src/decode.c:3051." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://gnu.com", + "refsource": "MISC", + "name": "http://gnu.com" + }, + { + "url": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684", + "refsource": "MISC", + "name": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684" } ] } diff --git a/2020/21xxx/CVE-2020-21843.json b/2020/21xxx/CVE-2020-21843.json index ffac5b6ecf1..cf09440ef7c 100644 --- a/2020/21xxx/CVE-2020-21843.json +++ b/2020/21xxx/CVE-2020-21843.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21843", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21843", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_read_RC ../../src/bits.c:318." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://gnu.com", + "refsource": "MISC", + "name": "http://gnu.com" + }, + { + "url": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857", + "refsource": "MISC", + "name": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857" } ] } diff --git a/2020/21xxx/CVE-2020-21844.json b/2020/21xxx/CVE-2020-21844.json index 9d994b83085..64acd05920f 100644 --- a/2020/21xxx/CVE-2020-21844.json +++ b/2020/21xxx/CVE-2020-21844.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-21844", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-21844", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GNU LibreDWG 0.10 is affected by: memcpy-param-overlap. The impact is: execute arbitrary code (remote). The component is: read_2004_section_header ../../src/decode.c:2580." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://gnu.com", + "refsource": "MISC", + "name": "http://gnu.com" + }, + { + "url": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493607", + "refsource": "MISC", + "name": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493607" } ] } diff --git a/2020/24xxx/CVE-2020-24755.json b/2020/24xxx/CVE-2020-24755.json index d08d3fa69fc..88de96cdcfe 100644 --- a/2020/24xxx/CVE-2020-24755.json +++ b/2020/24xxx/CVE-2020-24755.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24755", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24755", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Ubiquiti UniFi Video v3.10.13, when the executable starts, its first library validation is in the current directory. This allows the impersonation and modification of the library to execute code on the system. This was tested in (Windows 7 x64/Windows 10 x64)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.youtube.com/watch?v=T41h4yeh9dk", + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=T41h4yeh9dk" } ] } diff --git a/2020/36xxx/CVE-2020-36363.json b/2020/36xxx/CVE-2020-36363.json new file mode 100644 index 00000000000..c995aca908f --- /dev/null +++ b/2020/36xxx/CVE-2020-36363.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36363", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33054.json b/2021/33xxx/CVE-2021-33054.json new file mode 100644 index 00000000000..3403d9abc16 --- /dev/null +++ b/2021/33xxx/CVE-2021-33054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33055.json b/2021/33xxx/CVE-2021-33055.json new file mode 100644 index 00000000000..b3ec59eea34 --- /dev/null +++ b/2021/33xxx/CVE-2021-33055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file