diff --git a/2020/25xxx/CVE-2020-25693.json b/2020/25xxx/CVE-2020-25693.json index 77bb5c4a585..9526abcdda3 100644 --- a/2020/25xxx/CVE-2020-25693.json +++ b/2020/25xxx/CVE-2020-25693.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1893377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893377" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-ca1151e997", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MJ5Q7NNUPXATTBUKHFKIYYAV5GJDYCZL/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-bc6585e31a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZ3NPLYXZWEL7HETIFZVCXEZZ2WYYRWA/" } ] }, diff --git a/2020/36xxx/CVE-2020-36277.json b/2020/36xxx/CVE-2020-36277.json index 58df77b069d..d69cc619b7e 100644 --- a/2020/36xxx/CVE-2020-36277.json +++ b/2020/36xxx/CVE-2020-36277.json @@ -71,6 +71,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-977ebc82da", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f5f2803fff", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/" } ] } diff --git a/2020/36xxx/CVE-2020-36278.json b/2020/36xxx/CVE-2020-36278.json index d7cc09ed92c..37d43567ba2 100644 --- a/2020/36xxx/CVE-2020-36278.json +++ b/2020/36xxx/CVE-2020-36278.json @@ -71,6 +71,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-977ebc82da", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f5f2803fff", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/" } ] } diff --git a/2020/36xxx/CVE-2020-36279.json b/2020/36xxx/CVE-2020-36279.json index af9b40dcb62..c5d1da95f81 100644 --- a/2020/36xxx/CVE-2020-36279.json +++ b/2020/36xxx/CVE-2020-36279.json @@ -71,6 +71,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-977ebc82da", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f5f2803fff", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/" } ] } diff --git a/2020/36xxx/CVE-2020-36280.json b/2020/36xxx/CVE-2020-36280.json index f9830ee6bd1..0c3d4b9af6f 100644 --- a/2020/36xxx/CVE-2020-36280.json +++ b/2020/36xxx/CVE-2020-36280.json @@ -66,6 +66,16 @@ "url": "https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c", "refsource": "MISC", "name": "https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-977ebc82da", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f5f2803fff", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/" } ] } diff --git a/2020/36xxx/CVE-2020-36281.json b/2020/36xxx/CVE-2020-36281.json index ff69914e690..aa3f1dc5b1e 100644 --- a/2020/36xxx/CVE-2020-36281.json +++ b/2020/36xxx/CVE-2020-36281.json @@ -71,6 +71,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-977ebc82da", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f5f2803fff", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/" } ] } diff --git a/2021/26xxx/CVE-2021-26563.json b/2021/26xxx/CVE-2021-26563.json index d05e83389a0..17374f7a051 100644 --- a/2021/26xxx/CVE-2021-26563.json +++ b/2021/26xxx/CVE-2021-26563.json @@ -65,7 +65,12 @@ "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" + }, + { + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1158", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1158" } ] } -} +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26564.json b/2021/26xxx/CVE-2021-26564.json index d003ffc460f..3a08a8d6e92 100644 --- a/2021/26xxx/CVE-2021-26564.json +++ b/2021/26xxx/CVE-2021-26564.json @@ -65,7 +65,12 @@ "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" + }, + { + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ] } -} +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26565.json b/2021/26xxx/CVE-2021-26565.json index 50a7a9a5f9d..cebd22de59d 100644 --- a/2021/26xxx/CVE-2021-26565.json +++ b/2021/26xxx/CVE-2021-26565.json @@ -65,7 +65,12 @@ "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" + }, + { + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ] } -} +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26566.json b/2021/26xxx/CVE-2021-26566.json index f9cc5e5b8f4..3f0a8241fa4 100644 --- a/2021/26xxx/CVE-2021-26566.json +++ b/2021/26xxx/CVE-2021-26566.json @@ -65,7 +65,12 @@ "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" + }, + { + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ] } -} +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28153.json b/2021/28xxx/CVE-2021-28153.json index 7670b2994ed..0c4448161a5 100644 --- a/2021/28xxx/CVE-2021-28153.json +++ b/2021/28xxx/CVE-2021-28153.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210416-0003/", "url": "https://security.netapp.com/advisory/ntap-20210416-0003/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5c81cb03d0", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/" } ] } diff --git a/2021/29xxx/CVE-2021-29279.json b/2021/29xxx/CVE-2021-29279.json index 8e34fbbf301..2b43fa8d967 100644 --- a/2021/29xxx/CVE-2021-29279.json +++ b/2021/29xxx/CVE-2021-29279.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29279", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-29279", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a integer overflow in function filter_core/filter_props.c:gf_props_assign_value in GPAC 1.0.1. In which, the arg const GF_PropertyValue *value,maybe value->value.data.size is a negative number. In result, memcpy in gf_props_assign_value failed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1718", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1718" + }, + { + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/da69ad1f970a7e17c865eaec9af98cc84df10d5b", + "url": "https://github.com/gpac/gpac/commit/da69ad1f970a7e17c865eaec9af98cc84df10d5b" } ] } diff --git a/2021/30xxx/CVE-2021-30014.json b/2021/30xxx/CVE-2021-30014.json index d7d018dc23b..d0123744cf3 100644 --- a/2021/30xxx/CVE-2021-30014.json +++ b/2021/30xxx/CVE-2021-30014.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-30014", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-30014", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a integer overflow in media_tools/av_parsers.c in the hevc_parse_slice_segment function in GPAC 1.0.1 which results in a crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1721", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1721" + }, + { + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788", + "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" } ] } diff --git a/2021/30xxx/CVE-2021-30015.json b/2021/30xxx/CVE-2021-30015.json index 922c494f1c2..1445f15af80 100644 --- a/2021/30xxx/CVE-2021-30015.json +++ b/2021/30xxx/CVE-2021-30015.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-30015", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-30015", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a Null Pointer Dereference in function filter_core/filter_pck.c:gf_filter_pck_new_alloc_internal in GPAC 1.0.1. The pid comes from function av1dmx_parse_flush_sample, the ctx.opid maybe NULL. The result is a crash in gf_filter_pck_new_alloc_internal." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1719", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1719" + }, + { + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/13dad7d5ef74ca2e6fe4010f5b03eb12e9bbe0ec", + "url": "https://github.com/gpac/gpac/commit/13dad7d5ef74ca2e6fe4010f5b03eb12e9bbe0ec" } ] } diff --git a/2021/30xxx/CVE-2021-30019.json b/2021/30xxx/CVE-2021-30019.json index c842d9ee619..d2ef263fc9c 100644 --- a/2021/30xxx/CVE-2021-30019.json +++ b/2021/30xxx/CVE-2021-30019.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-30019", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-30019", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1723", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1723" + }, + { + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc", + "url": "https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc" } ] } diff --git a/2021/30xxx/CVE-2021-30020.json b/2021/30xxx/CVE-2021-30020.json index 06670ac3ed8..4d925e587e6 100644 --- a/2021/30xxx/CVE-2021-30020.json +++ b/2021/30xxx/CVE-2021-30020.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-30020", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-30020", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the function gf_hevc_read_pps_bs_internal function in media_tools/av_parsers.c in GPAC 1.0.1 there is a loop, which with crafted file, pps->num_tile_columns may be larger than sizeof(pps->column_width), which results in a heap overflow in the loop." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1722", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1722" + }, + { + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788", + "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" } ] } diff --git a/2021/30xxx/CVE-2021-30022.json b/2021/30xxx/CVE-2021-30022.json index 0df575d046a..d7062acbde8 100644 --- a/2021/30xxx/CVE-2021-30022.json +++ b/2021/30xxx/CVE-2021-30022.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-30022", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-30022", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1720", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1720" + }, + { + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788", + "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" } ] } diff --git a/2021/30xxx/CVE-2021-30199.json b/2021/30xxx/CVE-2021-30199.json index 229f425c5a9..ad06a742a07 100644 --- a/2021/30xxx/CVE-2021-30199.json +++ b/2021/30xxx/CVE-2021-30199.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-30199", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-30199", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In filters/reframe_latm.c in GPAC 1.0.1 there is a Null Pointer Dereference, when gf_filter_pck_get_data is called. The first arg pck may be null with a crafted mp4 file,which results in a crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gpac/gpac/issues/1728", + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/issues/1728" + }, + { + "refsource": "MISC", + "name": "https://github.com/gpac/gpac/commit/b2db2f99b4c30f96e17b9a14537c776da6cb5dca", + "url": "https://github.com/gpac/gpac/commit/b2db2f99b4c30f96e17b9a14537c776da6cb5dca" } ] } diff --git a/2021/3xxx/CVE-2021-3508.json b/2021/3xxx/CVE-2021-3508.json new file mode 100644 index 00000000000..d20312dde5f --- /dev/null +++ b/2021/3xxx/CVE-2021-3508.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3508", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file