From f89c8dc4b453f05391c5a6e91841163f141b6c2a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 22 Oct 2020 21:01:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/18xxx/CVE-2018-18508.json | 68 +++++++++++++++++++++++--- 2019/17xxx/CVE-2019-17006.json | 68 ++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17007.json | 68 ++++++++++++++++++++++++++ 2020/11xxx/CVE-2020-11853.json | 50 +++++++++++++++++-- 2020/13xxx/CVE-2020-13327.json | 85 ++++++++++++++++++++++++++++++-- 2020/15xxx/CVE-2020-15680.json | 56 ++++++++++++++++++++-- 2020/15xxx/CVE-2020-15681.json | 56 ++++++++++++++++++++-- 2020/15xxx/CVE-2020-15682.json | 56 ++++++++++++++++++++-- 2020/15xxx/CVE-2020-15683.json | 88 ++++++++++++++++++++++++++++++++-- 2020/15xxx/CVE-2020-15684.json | 56 ++++++++++++++++++++-- 2020/18xxx/CVE-2020-18129.json | 56 +++++++++++++++++++--- 2020/25xxx/CVE-2020-25186.json | 50 +++++++++++++++++-- 2020/27xxx/CVE-2020-27670.json | 62 ++++++++++++++++++++++++ 2020/27xxx/CVE-2020-27671.json | 62 ++++++++++++++++++++++++ 2020/27xxx/CVE-2020-27672.json | 62 ++++++++++++++++++++++++ 2020/27xxx/CVE-2020-27673.json | 72 ++++++++++++++++++++++++++++ 2020/27xxx/CVE-2020-27674.json | 62 ++++++++++++++++++++++++ 2020/27xxx/CVE-2020-27675.json | 72 ++++++++++++++++++++++++++++ 2020/3xxx/CVE-2020-3996.json | 50 +++++++++++++++++-- 19 files changed, 1158 insertions(+), 41 deletions(-) create mode 100644 2019/17xxx/CVE-2019-17006.json create mode 100644 2019/17xxx/CVE-2019-17007.json create mode 100644 2020/27xxx/CVE-2020-27670.json create mode 100644 2020/27xxx/CVE-2020-27671.json create mode 100644 2020/27xxx/CVE-2020-27672.json create mode 100644 2020/27xxx/CVE-2020-27673.json create mode 100644 2020/27xxx/CVE-2020-27674.json create mode 100644 2020/27xxx/CVE-2020-27675.json diff --git a/2018/18xxx/CVE-2018-18508.json b/2018/18xxx/CVE-2018-18508.json index 9e20e3494f0..30da6a139b9 100644 --- a/2018/18xxx/CVE-2018-18508.json +++ b/2018/18xxx/CVE-2018-18508.json @@ -1,17 +1,71 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-18508", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-18508", + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "NSS", + "version": { + "version_data": [ + { + "version_value": "3.41.1", + "version_affected": "<" + }, + { + "version_value": "3.36.7", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service through malformed signatures" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes", + "refsource": "MISC", + "name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes" + }, + { + "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes", + "refsource": "MISC", + "name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service." } ] } diff --git a/2019/17xxx/CVE-2019-17006.json b/2019/17xxx/CVE-2019-17006.json new file mode 100644 index 00000000000..16901e2fab0 --- /dev/null +++ b/2019/17xxx/CVE-2019-17006.json @@ -0,0 +1,68 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-17006", + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "NSS", + "version": { + "version_data": [ + { + "version_value": "3.46", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "missing length checks for cryptographic primitives" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes", + "refsource": "MISC", + "name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1539788", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1539788" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow." + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17007.json b/2019/17xxx/CVE-2019-17007.json new file mode 100644 index 00000000000..bbc4766f508 --- /dev/null +++ b/2019/17xxx/CVE-2019-17007.json @@ -0,0 +1,68 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-17007", + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "NSS", + "version": { + "version_data": [ + { + "version_value": "3.44", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CERT_DecodeCertPackage() crash with Netscape Certificate Sequences" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44_release_notes", + "refsource": "MISC", + "name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44_release_notes" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1533216", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1533216" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service." + } + ] + } +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11853.json b/2020/11xxx/CVE-2020-11853.json index eda60828a33..52090d03e0a 100644 --- a/2020/11xxx/CVE-2020-11853.json +++ b/2020/11xxx/CVE-2020-11853.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-11853", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@suse.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Operation Bridge Manager", + "version": { + "version_data": [ + { + "version_value": "2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://softwaresupport.softwaregrp.com/doc/KM03747658", + "url": "https://softwaresupport.softwaregrp.com/doc/KM03747658" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary code execution vulnerability exists in Micro Focus Operation Bridge Manager 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. The vulnerability could allow remote attackers to execute arbitrary code." } ] } diff --git a/2020/13xxx/CVE-2020-13327.json b/2020/13xxx/CVE-2020-13327.json index 6a0ac2b79f4..3fc59d29960 100644 --- a/2020/13xxx/CVE-2020-13327.json +++ b/2020/13xxx/CVE-2020-13327.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-13327", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab Runner", + "version": { + "version_data": [ + { + "version_value": ">=13.4.0, <13.4.2" + }, + { + "version_value": ">=13.3.0, <13.3.7" + }, + { + "version_value": ">=13.2.0, <13.2.10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Configuration in GitLab Runner" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab-runner/-/issues/26833", + "url": "https://gitlab.com/gitlab-org/gitlab-runner/-/issues/26833", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13327.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13327.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab Runner affecting all versions starting from 13.4.0 before 13.4.2, all versions starting from 13.3.0 before 13.3.7, all versions starting from 13.2.0 before 13.2.10. Insecure Runner Configuration in Kubernetes Environments" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2020/15xxx/CVE-2020-15680.json b/2020/15xxx/CVE-2020-15680.json index d74143fd1a5..7fba4f69426 100644 --- a/2020/15xxx/CVE-2020-15680.json +++ b/2020/15xxx/CVE-2020-15680.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15680", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Firefox", + "version": { + "version_data": [ + { + "version_value": "82", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Presence of external protocol handlers could be determined through image tags" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-45/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-45/" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1658881", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1658881" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82." } ] } diff --git a/2020/15xxx/CVE-2020-15681.json b/2020/15xxx/CVE-2020-15681.json index 10942294d12..3537b0a6174 100644 --- a/2020/15xxx/CVE-2020-15681.json +++ b/2020/15xxx/CVE-2020-15681.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15681", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Firefox", + "version": { + "version_data": [ + { + "version_value": "82", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Multiple WASM threads may have overwritten each others' stub table entries" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-45/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-45/" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1666568", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1666568" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 82." } ] } diff --git a/2020/15xxx/CVE-2020-15682.json b/2020/15xxx/CVE-2020-15682.json index b7aa8604f3d..b5d78d6853f 100644 --- a/2020/15xxx/CVE-2020-15682.json +++ b/2020/15xxx/CVE-2020-15682.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15682", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Firefox", + "version": { + "version_data": [ + { + "version_value": "82", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The domain associated with the prompt to open an external protocol could be spoofed to display the incorrect origin" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-45/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-45/" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1636654", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1636654" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin. This vulnerability affects Firefox < 82." } ] } diff --git a/2020/15xxx/CVE-2020-15683.json b/2020/15xxx/CVE-2020-15683.json index 0dae4c34e97..b45eb79ee64 100644 --- a/2020/15xxx/CVE-2020-15683.json +++ b/2020/15xxx/CVE-2020-15683.json @@ -4,14 +4,96 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15683", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Firefox ESR", + "version": { + "version_data": [ + { + "version_value": "78.4", + "version_affected": "<" + } + ] + } + }, + { + "product_name": "Firefox", + "version": { + "version_data": [ + { + "version_value": "82", + "version_affected": "<" + } + ] + } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_value": "78.4", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-45/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-45/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-47/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-47/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-46/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-46/" + }, + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4." } ] } diff --git a/2020/15xxx/CVE-2020-15684.json b/2020/15xxx/CVE-2020-15684.json index 9fb1ad662b1..77373ec2b97 100644 --- a/2020/15xxx/CVE-2020-15684.json +++ b/2020/15xxx/CVE-2020-15684.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15684", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Firefox", + "version": { + "version_data": [ + { + "version_value": "82", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory safety bugs fixed in Firefox 82" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mozilla.org/security/advisories/mfsa2020-45/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2020-45/" + }, + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1653764%2C1661402%2C1662259%2C1664257", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1653764%2C1661402%2C1662259%2C1664257" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 82." } ] } diff --git a/2020/18xxx/CVE-2020-18129.json b/2020/18xxx/CVE-2020-18129.json index 82f75f3509b..888b9706894 100644 --- a/2020/18xxx/CVE-2020-18129.json +++ b/2020/18xxx/CVE-2020-18129.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18129", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18129", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CSRF vulnerability in Eyoucms v1.2.7 allows an attacker to add an admin account via login.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://baike.baidu.com/item/CSRF/2735433?fr=aladdin", + "refsource": "MISC", + "name": "https://baike.baidu.com/item/CSRF/2735433?fr=aladdin" } ] } diff --git a/2020/25xxx/CVE-2020-25186.json b/2020/25xxx/CVE-2020-25186.json index f9a07d1b2ee..47fca72dcbc 100644 --- a/2020/25xxx/CVE-2020-25186.json +++ b/2020/25xxx/CVE-2020-25186.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25186", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "WECON Technology Co., Ltd (WECON) LeviStudioU", + "version": { + "version_data": [ + { + "version_value": "Release Build 2019-09-21" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-238-03", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-238-03" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An XXE vulnerability exists within LeviStudioU Release Build 2019-09-21 and prior when processing parameter entities, which may allow file disclosure." } ] } diff --git a/2020/27xxx/CVE-2020-27670.json b/2020/27xxx/CVE-2020-27670.json new file mode 100644 index 00000000000..b56e8cdbaae --- /dev/null +++ b/2020/27xxx/CVE-2020-27670.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-27670", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xen.org/xsa/advisory-347.html", + "refsource": "MISC", + "name": "https://xenbits.xen.org/xsa/advisory-347.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27671.json b/2020/27xxx/CVE-2020-27671.json new file mode 100644 index 00000000000..d3ff6033111 --- /dev/null +++ b/2020/27xxx/CVE-2020-27671.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-27671", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xen.org/xsa/advisory-346.html", + "refsource": "MISC", + "name": "https://xenbits.xen.org/xsa/advisory-346.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27672.json b/2020/27xxx/CVE-2020-27672.json new file mode 100644 index 00000000000..eff8f0f5c21 --- /dev/null +++ b/2020/27xxx/CVE-2020-27672.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-27672", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xen.org/xsa/advisory-345.html", + "refsource": "MISC", + "name": "https://xenbits.xen.org/xsa/advisory-345.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27673.json b/2020/27xxx/CVE-2020-27673.json new file mode 100644 index 00000000000..2f9d1704bc9 --- /dev/null +++ b/2020/27xxx/CVE-2020-27673.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-27673", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xen.org/xsa/advisory-332.html", + "refsource": "MISC", + "name": "https://xenbits.xen.org/xsa/advisory-332.html" + }, + { + "url": "https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070" + }, + { + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070", + "refsource": "MISC", + "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070" + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27674.json b/2020/27xxx/CVE-2020-27674.json new file mode 100644 index 00000000000..31b5987a191 --- /dev/null +++ b/2020/27xxx/CVE-2020-27674.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-27674", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xen.org/xsa/advisory-286.html", + "refsource": "MISC", + "name": "https://xenbits.xen.org/xsa/advisory-286.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27675.json b/2020/27xxx/CVE-2020-27675.json new file mode 100644 index 00000000000..db3514cde36 --- /dev/null +++ b/2020/27xxx/CVE-2020-27675.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-27675", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xen.org/xsa/advisory-331.html", + "refsource": "MISC", + "name": "https://xenbits.xen.org/xsa/advisory-331.html" + }, + { + "url": "https://github.com/torvalds/linux/commit/073d0552ead5bfc7a3a9c01de590e924f11b5dd2", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/073d0552ead5bfc7a3a9c01de590e924f11b5dd2" + }, + { + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073d0552ead5bfc7a3a9c01de590e924f11b5dd2", + "refsource": "MISC", + "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073d0552ead5bfc7a3a9c01de590e924f11b5dd2" + } + ] + } +} \ No newline at end of file diff --git a/2020/3xxx/CVE-2020-3996.json b/2020/3xxx/CVE-2020-3996.json index 7695a6451af..08041a31a48 100644 --- a/2020/3xxx/CVE-2020-3996.json +++ b/2020/3xxx/CVE-2020-3996.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-3996", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@vmware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Velero", + "version": { + "version_data": [ + { + "version_value": "Velero versions 0.* and 1.* prior to 1.4.3 and 1.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information leakage due to incorrect volume assignment" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/vmware-tanzu/velero/security/advisories/GHSA-72xg-3mcq-52v4", + "url": "https://github.com/vmware-tanzu/velero/security/advisories/GHSA-72xg-3mcq-52v4" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Velero (prior to 1.4.3 and 1.5.2) in some instances doesn\u2019t properly manage volume identifiers which may result in information leakage to unauthorized users." } ] }