diff --git a/2020/12xxx/CVE-2020-12373.json b/2020/12xxx/CVE-2020-12373.json index 16582730488..50260ffac8b 100644 --- a/2020/12xxx/CVE-2020-12373.json +++ b/2020/12xxx/CVE-2020-12373.json @@ -15,11 +15,11 @@ "product": { "product_data": [ { - "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules", + "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { - "version_value": "before version 2.47" + "version_value": "before version 26.20.100.8141" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "escalation of privilege" + "value": "denial of service" } ] } @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html", - "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html" + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ] }, @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access." + "value": "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access." } ] } diff --git a/2020/12xxx/CVE-2020-12374.json b/2020/12xxx/CVE-2020-12374.json index 0a60cd382a3..450b9af10c9 100644 --- a/2020/12xxx/CVE-2020-12374.json +++ b/2020/12xxx/CVE-2020-12374.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-12374", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules", + "version": { + "version_data": [ + { + "version_value": "before version 2.47" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "escalation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access." } ] } diff --git a/2020/35xxx/CVE-2020-35776.json b/2020/35xxx/CVE-2020-35776.json index bac4319afe6..3232afa45b8 100644 --- a/2020/35xxx/CVE-2020-35776.json +++ b/2020/35xxx/CVE-2020-35776.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://issues.asterisk.org/jira/browse/ASTERISK-29227", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29227" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html", + "url": "http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html" } ] } diff --git a/2021/22xxx/CVE-2021-22701.json b/2021/22xxx/CVE-2021-22701.json index 23998aac2af..3f899d7b58e 100644 --- a/2021/22xxx/CVE-2021-22701.json +++ b/2021/22xxx/CVE-2021-22701.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22701", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions)", + "version": { + "version_data": [ + { + "version_value": "EcoStruxure\u2122 Operator Terminal Expert 3.1 Service Pack 1A and prior running on Harmony HMIs HMIST6 Series, HMIG3U in HMIGTU Series, HMISTO Series and Pro-face BLUE 3.1 Service Pack 1A and prior running on Pro-face HMIs: ST6000 Series, SP-5B41 in SP5000 Series, GP4100 Series" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-040-01/", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-040-01/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-352: Cross-Site Request Forgery vulnerability exists in PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause a user to perform an unintended action on the target device when using the HTTP web interface." } ] } diff --git a/2021/22xxx/CVE-2021-22702.json b/2021/22xxx/CVE-2021-22702.json index 9b8fece4096..103f64f08fc 100644 --- a/2021/22xxx/CVE-2021-22702.json +++ b/2021/22xxx/CVE-2021-22702.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22702", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PowerLogic ION7400, ION7650, ION7700/73xx, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions)", + "version": { + "version_data": [ + { + "version_value": "EcoStruxure Power Build - Rapsody software V2.1.13 and prior." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319: Cleartext transmission of sensitive information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-040-01/", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-040-01/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-319: Cleartext transmission of sensitive information vulnerability exists in PowerLogic ION7400, ION7650, ION7700/73xx, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause disclosure of user credentials when a malicious actor intercepts Telnet network traffic between a user and the device." } ] } diff --git a/2021/22xxx/CVE-2021-22703.json b/2021/22xxx/CVE-2021-22703.json index 3bf10ca5a35..b13938f041e 100644 --- a/2021/22xxx/CVE-2021-22703.json +++ b/2021/22xxx/CVE-2021-22703.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22703", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions)", + "version": { + "version_data": [ + { + "version_value": "EcoStruxure Power Build - Rapsody software V2.1.13 and prior." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319: Cleartext transmission of sensitive information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-040-01/", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-040-01/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-319: Cleartext transmission of sensitive information vulnerability exists in PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause disclosure of user credentials when a malicious actor intercepts HTTP network traffic between a user and the device." } ] } diff --git a/2021/26xxx/CVE-2021-26712.json b/2021/26xxx/CVE-2021-26712.json index f58578d5b35..4e5ae3ed974 100644 --- a/2021/26xxx/CVE-2021-26712.json +++ b/2021/26xxx/CVE-2021-26712.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://issues.asterisk.org/jira/browse/ASTERISK-29260", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29260" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html", + "url": "http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html" } ] } diff --git a/2021/26xxx/CVE-2021-26717.json b/2021/26xxx/CVE-2021-26717.json index 59ee7b1e979..b6c11aa9fa6 100644 --- a/2021/26xxx/CVE-2021-26717.json +++ b/2021/26xxx/CVE-2021-26717.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://issues.asterisk.org/jira/browse/ASTERISK-29203", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29203" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161471/Asterisk-Project-Security-Advisory-AST-2021-002.html", + "url": "http://packetstormsecurity.com/files/161471/Asterisk-Project-Security-Advisory-AST-2021-002.html" } ] } diff --git a/2021/26xxx/CVE-2021-26906.json b/2021/26xxx/CVE-2021-26906.json index 73c386f90aa..38a8f89ce52 100644 --- a/2021/26xxx/CVE-2021-26906.json +++ b/2021/26xxx/CVE-2021-26906.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://issues.asterisk.org/jira/browse/ASTERISK-29196", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29196" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html", + "url": "http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html" } ] }