From 06a68662b551cba795c27137744c4c46c2569945 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 26 Jan 2021 18:04:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10086.json | 5 --- 2020/27xxx/CVE-2020-27733.json | 5 +++ 2020/35xxx/CVE-2020-35753.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36206.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36207.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36208.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36209.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36210.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36211.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36212.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36213.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36214.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36215.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36216.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36217.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36218.json | 56 ++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36219.json | 62 ++++++++++++++++++++++++++++++++++ 2020/36xxx/CVE-2020-36220.json | 62 ++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6655.json | 9 +++-- 2020/6xxx/CVE-2020-6656.json | 9 +++-- 2021/1xxx/CVE-2021-1723.json | 10 ++++++ 2021/25xxx/CVE-2021-25779.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25780.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25781.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25782.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25783.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25784.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25785.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25786.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25787.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25900.json | 62 ++++++++++++++++++++++++++++++++++ 2021/25xxx/CVE-2021-25901.json | 62 ++++++++++++++++++++++++++++++++++ 2021/25xxx/CVE-2021-25902.json | 62 ++++++++++++++++++++++++++++++++++ 2021/25xxx/CVE-2021-25903.json | 62 ++++++++++++++++++++++++++++++++++ 2021/25xxx/CVE-2021-25904.json | 62 ++++++++++++++++++++++++++++++++++ 2021/25xxx/CVE-2021-25950.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25951.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25952.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25953.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25954.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25955.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25956.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25957.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25958.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25959.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25960.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25961.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25962.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25963.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25964.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25965.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25966.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25967.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25968.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25969.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25970.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25971.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25972.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25973.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25974.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25975.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25976.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25977.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25978.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25979.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25980.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25981.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25982.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25983.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25984.json | 18 ++++++++++ 2021/25xxx/CVE-2021-25985.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3193.json | 2 +- 2021/3xxx/CVE-2021-3199.json | 61 +++++++++++++++++++++++++++++---- 2021/3xxx/CVE-2021-3200.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3201.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3202.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3203.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3204.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3205.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3206.json | 18 ++++++++++ 80 files changed, 2149 insertions(+), 106 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36219.json create mode 100644 2020/36xxx/CVE-2020-36220.json create mode 100644 2021/25xxx/CVE-2021-25779.json create mode 100644 2021/25xxx/CVE-2021-25780.json create mode 100644 2021/25xxx/CVE-2021-25781.json create mode 100644 2021/25xxx/CVE-2021-25782.json create mode 100644 2021/25xxx/CVE-2021-25783.json create mode 100644 2021/25xxx/CVE-2021-25784.json create mode 100644 2021/25xxx/CVE-2021-25785.json create mode 100644 2021/25xxx/CVE-2021-25786.json create mode 100644 2021/25xxx/CVE-2021-25787.json create mode 100644 2021/25xxx/CVE-2021-25900.json create mode 100644 2021/25xxx/CVE-2021-25901.json create mode 100644 2021/25xxx/CVE-2021-25902.json create mode 100644 2021/25xxx/CVE-2021-25903.json create mode 100644 2021/25xxx/CVE-2021-25904.json create mode 100644 2021/25xxx/CVE-2021-25950.json create mode 100644 2021/25xxx/CVE-2021-25951.json create mode 100644 2021/25xxx/CVE-2021-25952.json create mode 100644 2021/25xxx/CVE-2021-25953.json create mode 100644 2021/25xxx/CVE-2021-25954.json create mode 100644 2021/25xxx/CVE-2021-25955.json create mode 100644 2021/25xxx/CVE-2021-25956.json create mode 100644 2021/25xxx/CVE-2021-25957.json create mode 100644 2021/25xxx/CVE-2021-25958.json create mode 100644 2021/25xxx/CVE-2021-25959.json create mode 100644 2021/25xxx/CVE-2021-25960.json create mode 100644 2021/25xxx/CVE-2021-25961.json create mode 100644 2021/25xxx/CVE-2021-25962.json create mode 100644 2021/25xxx/CVE-2021-25963.json create mode 100644 2021/25xxx/CVE-2021-25964.json create mode 100644 2021/25xxx/CVE-2021-25965.json create mode 100644 2021/25xxx/CVE-2021-25966.json create mode 100644 2021/25xxx/CVE-2021-25967.json create mode 100644 2021/25xxx/CVE-2021-25968.json create mode 100644 2021/25xxx/CVE-2021-25969.json create mode 100644 2021/25xxx/CVE-2021-25970.json create mode 100644 2021/25xxx/CVE-2021-25971.json create mode 100644 2021/25xxx/CVE-2021-25972.json create mode 100644 2021/25xxx/CVE-2021-25973.json create mode 100644 2021/25xxx/CVE-2021-25974.json create mode 100644 2021/25xxx/CVE-2021-25975.json create mode 100644 2021/25xxx/CVE-2021-25976.json create mode 100644 2021/25xxx/CVE-2021-25977.json create mode 100644 2021/25xxx/CVE-2021-25978.json create mode 100644 2021/25xxx/CVE-2021-25979.json create mode 100644 2021/25xxx/CVE-2021-25980.json create mode 100644 2021/25xxx/CVE-2021-25981.json create mode 100644 2021/25xxx/CVE-2021-25982.json create mode 100644 2021/25xxx/CVE-2021-25983.json create mode 100644 2021/25xxx/CVE-2021-25984.json create mode 100644 2021/25xxx/CVE-2021-25985.json create mode 100644 2021/3xxx/CVE-2021-3200.json create mode 100644 2021/3xxx/CVE-2021-3201.json create mode 100644 2021/3xxx/CVE-2021-3202.json create mode 100644 2021/3xxx/CVE-2021-3203.json create mode 100644 2021/3xxx/CVE-2021-3204.json create mode 100644 2021/3xxx/CVE-2021-3205.json create mode 100644 2021/3xxx/CVE-2021-3206.json diff --git a/2019/10xxx/CVE-2019-10086.json b/2019/10xxx/CVE-2019-10086.json index 8dd2741b36e..656260d99c1 100644 --- a/2019/10xxx/CVE-2019-10086.json +++ b/2019/10xxx/CVE-2019-10086.json @@ -243,11 +243,6 @@ "refsource": "MLIST", "name": "[dolphinscheduler-commits] 20210121 [GitHub] [incubator-dolphinscheduler] c-f-cooper commented on pull request #4525: [Improvement-4506][LICENSE] upgrade the version of the commons-beanutils", "url": "https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E" - }, - { - "refsource": "MLIST", - "name": "[dolphinscheduler-commits] 20210122 [GitHub] [incubator-dolphinscheduler] c-f-cooper commented on pull request #4525: [Improvement-4506][LICENSE] upgrade the version of the commons-beanutils", - "url": "https://lists.apache.org/thread.html/rddb872c3ef7d4460f37d3ecc4baa917bdbe7119403a991182d347671@%3Ccommits.dolphinscheduler.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27733.json b/2020/27xxx/CVE-2020-27733.json index 4e617a69ede..9f2412ad239 100644 --- a/2020/27xxx/CVE-2020-27733.json +++ b/2020/27xxx/CVE-2020-27733.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.manageengine.com/products/applications_manager/issues.html#v14880", "url": "https://www.manageengine.com/products/applications_manager/issues.html#v14880" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2020-27733.html", + "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2020-27733.html" } ] } diff --git a/2020/35xxx/CVE-2020-35753.json b/2020/35xxx/CVE-2020-35753.json index 8839c79ba56..99d098197af 100644 --- a/2020/35xxx/CVE-2020-35753.json +++ b/2020/35xxx/CVE-2020-35753.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35753", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35753", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The job posting recommendation form in Persis Human Resource Management Portal (Versions 17.2.00 through 17.2.35 and 19.0.00 through 19.0.20), when the \"Recommend job posting\" function is enabled, allows XSS via the SENDER parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://it-sec.de/ger/Aktuelles-Termine/it.sec-blog/it.sec-Research-Team-findet-unbekannte-Schwachstelle-in-Persis-Online-Bewerberportal", + "url": "https://it-sec.de/ger/Aktuelles-Termine/it.sec-blog/it.sec-Research-Team-findet-unbekannte-Schwachstelle-in-Persis-Online-Bewerberportal" } ] } diff --git a/2020/36xxx/CVE-2020-36206.json b/2020/36xxx/CVE-2020-36206.json index 6e2218bc9ca..2c25f965934 100644 --- a/2020/36xxx/CVE-2020-36206.json +++ b/2020/36xxx/CVE-2020-36206.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36206", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36206", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the rusb crate before 0.7.0 for Rust. Because of a lack of Send and Sync bounds, a data race and memory corruption can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0098.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0098.html" } ] } diff --git a/2020/36xxx/CVE-2020-36207.json b/2020/36xxx/CVE-2020-36207.json index 59689facf1b..0f5f02a0815 100644 --- a/2020/36xxx/CVE-2020-36207.json +++ b/2020/36xxx/CVE-2020-36207.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36207", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36207", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the aovec crate through 2020-12-10 for Rust. Because Aovec does not have bounds on its Send trait or Sync trait, a data race and memory corruption can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0099.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0099.html" } ] } diff --git a/2020/36xxx/CVE-2020-36208.json b/2020/36xxx/CVE-2020-36208.json index 00626f1d2f7..866aa7c4d7d 100644 --- a/2020/36xxx/CVE-2020-36208.json +++ b/2020/36xxx/CVE-2020-36208.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36208", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36208", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the conquer-once crate before 0.3.2 for Rust. Thread crossing can occur for a non-Send but Sync type, leading to memory corruption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0101.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0101.html" } ] } diff --git a/2020/36xxx/CVE-2020-36209.json b/2020/36xxx/CVE-2020-36209.json index d2727611f36..e3cfeb53eb7 100644 --- a/2020/36xxx/CVE-2020-36209.json +++ b/2020/36xxx/CVE-2020-36209.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36209", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36209", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the late-static crate before 0.4.0 for Rust. Because Sync is implemented for LateStatic with T: Send, a data race can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0102.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0102.html" } ] } diff --git a/2020/36xxx/CVE-2020-36210.json b/2020/36xxx/CVE-2020-36210.json index 9cf6232ecc2..9d03232479b 100644 --- a/2020/36xxx/CVE-2020-36210.json +++ b/2020/36xxx/CVE-2020-36210.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36210", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36210", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the autorand crate before 0.2.3 for Rust. Because of impl Random on arrays, uninitialized memory can be dropped when a panic occurs, leading to memory corruption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0103.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0103.html" } ] } diff --git a/2020/36xxx/CVE-2020-36211.json b/2020/36xxx/CVE-2020-36211.json index 5568750919d..2ce09059086 100644 --- a/2020/36xxx/CVE-2020-36211.json +++ b/2020/36xxx/CVE-2020-36211.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36211", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36211", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the gfwx crate before 0.3.0 for Rust. Because ImageChunkMut does not have bounds on its Send trait or Sync trait, a data race and memory corruption can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0104.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0104.html" } ] } diff --git a/2020/36xxx/CVE-2020-36212.json b/2020/36xxx/CVE-2020-36212.json index 4d8e2ebf7da..bb4041aa385 100644 --- a/2020/36xxx/CVE-2020-36212.json +++ b/2020/36xxx/CVE-2020-36212.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36212", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36212", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the abi_stable crate before 0.9.1 for Rust. DrainFilter lacks soundness because of a double drop." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0105.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0105.html" } ] } diff --git a/2020/36xxx/CVE-2020-36213.json b/2020/36xxx/CVE-2020-36213.json index 46742fa21a7..871d74af111 100644 --- a/2020/36xxx/CVE-2020-36213.json +++ b/2020/36xxx/CVE-2020-36213.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36213", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36213", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the abi_stable crate before 0.9.1 for Rust. A retain call can create an invalid UTF-8 string, violating soundness." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0105.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0105.html" } ] } diff --git a/2020/36xxx/CVE-2020-36214.json b/2020/36xxx/CVE-2020-36214.json index f4ccbba285f..d7a82bf5707 100644 --- a/2020/36xxx/CVE-2020-36214.json +++ b/2020/36xxx/CVE-2020-36214.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36214", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36214", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the multiqueue2 crate before 0.1.7 for Rust. Because a non-Send type can be sent to a different thread, a data race can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0106.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0106.html" } ] } diff --git a/2020/36xxx/CVE-2020-36215.json b/2020/36xxx/CVE-2020-36215.json index 284869d916a..3ea8076bfd2 100644 --- a/2020/36xxx/CVE-2020-36215.json +++ b/2020/36xxx/CVE-2020-36215.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36215", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36215", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the hashconsing crate before 1.1.0 for Rust. Because HConsed does not have bounds on its Send trait or Sync trait, memory corruption can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0107.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0107.html" } ] } diff --git a/2020/36xxx/CVE-2020-36216.json b/2020/36xxx/CVE-2020-36216.json index 949dd680bfd..3e3031c67db 100644 --- a/2020/36xxx/CVE-2020-36216.json +++ b/2020/36xxx/CVE-2020-36216.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36216", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36216", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Input in the eventio crate before 0.5.1 for Rust. Because a non-Send type can be sent to a different thread, a data race and memory corruption can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0108.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0108.html" } ] } diff --git a/2020/36xxx/CVE-2020-36217.json b/2020/36xxx/CVE-2020-36217.json index ab62c05b108..a01933ed986 100644 --- a/2020/36xxx/CVE-2020-36217.json +++ b/2020/36xxx/CVE-2020-36217.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36217", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36217", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the may_queue crate through 2020-11-10 for Rust. Because Queue does not have bounds on its Send trait or Sync trait, memory corruption can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0111.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0111.html" } ] } diff --git a/2020/36xxx/CVE-2020-36218.json b/2020/36xxx/CVE-2020-36218.json index cee809d0057..33fe687df60 100644 --- a/2020/36xxx/CVE-2020-36218.json +++ b/2020/36xxx/CVE-2020-36218.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36218", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36218", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the buttplug crate before 1.0.4 for Rust. ButtplugFutureStateShared does not properly consider (!Send|!Sync) objects, leading to a data race." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0112.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0112.html" } ] } diff --git a/2020/36xxx/CVE-2020-36219.json b/2020/36xxx/CVE-2020-36219.json new file mode 100644 index 00000000000..a5e67d4d0f4 --- /dev/null +++ b/2020/36xxx/CVE-2020-36219.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36219", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the atomic-option crate through 2020-10-31 for Rust. Because AtomicOption implements Sync unconditionally, a data race can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0113.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0113.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36220.json b/2020/36xxx/CVE-2020-36220.json new file mode 100644 index 00000000000..ae49128c8e8 --- /dev/null +++ b/2020/36xxx/CVE-2020-36220.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36220", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the va-ts crate before 0.0.4 for Rust. Because Demuxer omits a required T: Send bound, a data race and memory corruption can occur." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2020-0114.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2020-0114.html" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6655.json b/2020/6xxx/CVE-2020-6655.json index ff01c432601..031a31fc105 100644 --- a/2020/6xxx/CVE-2020-6655.json +++ b/2020/6xxx/CVE-2020-6655.json @@ -9,6 +9,7 @@ "vendor": { "vendor_data": [ { + "vendor_name": "Eaton", "product": { "product_data": [ { @@ -16,15 +17,13 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_value": "7.20" + "version_value": "v7.xx prior to v7.22" } ] } } ] - }, - "vendor_name": "Eaton" + } } ] } @@ -42,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "The Eaton's easySoft software v7.20 and prior are susceptible to Out-of-bounds remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user to upload the malformed .E70 file in the application. The vulnerability arises due to improper validation and parsing of the E70 file content by the application." + "value": "The Eaton's easySoft software v7.xx prior to v7.22 are susceptible to Out-of-bounds remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user to upload the malformed .E70 file in the application. The vulnerability arises due to improper validation and parsing of the E70 file content by the application." } ] }, diff --git a/2020/6xxx/CVE-2020-6656.json b/2020/6xxx/CVE-2020-6656.json index 0f23be40bd1..d68c9114184 100644 --- a/2020/6xxx/CVE-2020-6656.json +++ b/2020/6xxx/CVE-2020-6656.json @@ -9,6 +9,7 @@ "vendor": { "vendor_data": [ { + "vendor_name": "Eaton", "product": { "product_data": [ { @@ -16,15 +17,13 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_value": "7.20" + "version_value": "v7.xx prior to v7.22" } ] } } ] - }, - "vendor_name": "Eaton" + } } ] } @@ -42,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "Eaton's easySoft software v7.20 and prior are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion." + "value": "Eaton's easySoft software v7.xx prior to v7.22 are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion." } ] }, diff --git a/2021/1xxx/CVE-2021-1723.json b/2021/1xxx/CVE-2021-1723.json index 09c8d09afc7..1854059f5bd 100644 --- a/2021/1xxx/CVE-2021-1723.json +++ b/2021/1xxx/CVE-2021-1723.json @@ -116,6 +116,16 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1723", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1723" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-fb078913dd", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3L27CGRVEWUPELNJOGTCW6GLEDBECB4B/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-77a4202036", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRXHERXW4KR5WCP76UDW5PC7GX3YQLUW/" } ] } diff --git a/2021/25xxx/CVE-2021-25779.json b/2021/25xxx/CVE-2021-25779.json new file mode 100644 index 00000000000..a45526ba424 --- /dev/null +++ b/2021/25xxx/CVE-2021-25779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25780.json b/2021/25xxx/CVE-2021-25780.json new file mode 100644 index 00000000000..5ed6359675e --- /dev/null +++ b/2021/25xxx/CVE-2021-25780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25781.json b/2021/25xxx/CVE-2021-25781.json new file mode 100644 index 00000000000..3e71c0555e5 --- /dev/null +++ b/2021/25xxx/CVE-2021-25781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25782.json b/2021/25xxx/CVE-2021-25782.json new file mode 100644 index 00000000000..55c771e7274 --- /dev/null +++ b/2021/25xxx/CVE-2021-25782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25783.json b/2021/25xxx/CVE-2021-25783.json new file mode 100644 index 00000000000..5ae9951e0aa --- /dev/null +++ b/2021/25xxx/CVE-2021-25783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25784.json b/2021/25xxx/CVE-2021-25784.json new file mode 100644 index 00000000000..c7b5045403a --- /dev/null +++ b/2021/25xxx/CVE-2021-25784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25785.json b/2021/25xxx/CVE-2021-25785.json new file mode 100644 index 00000000000..a3b34f4d988 --- /dev/null +++ b/2021/25xxx/CVE-2021-25785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25786.json b/2021/25xxx/CVE-2021-25786.json new file mode 100644 index 00000000000..1e0055f99a3 --- /dev/null +++ b/2021/25xxx/CVE-2021-25786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25787.json b/2021/25xxx/CVE-2021-25787.json new file mode 100644 index 00000000000..b74b3577a87 --- /dev/null +++ b/2021/25xxx/CVE-2021-25787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25900.json b/2021/25xxx/CVE-2021-25900.json new file mode 100644 index 00000000000..ed4a71ea768 --- /dev/null +++ b/2021/25xxx/CVE-2021-25900.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-25900", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the smallvec crate before 0.6.14 and 1.x before 1.6.1 for Rust. There is a heap-based buffer overflow in SmallVec::insert_many." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0003.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0003.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25901.json b/2021/25xxx/CVE-2021-25901.json new file mode 100644 index 00000000000..ea3db2061f1 --- /dev/null +++ b/2021/25xxx/CVE-2021-25901.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-25901", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the lazy-init crate through 2021-01-17 for Rust. Lazy lacks a Send bound, leading to a data race." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0004.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0004.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25902.json b/2021/25xxx/CVE-2021-25902.json new file mode 100644 index 00000000000..63f9d025aab --- /dev/null +++ b/2021/25xxx/CVE-2021-25902.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-25902", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the glsl-layout crate before 0.4.0 for Rust. When a panic occurs, map_array can perform a double drop." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0005.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0005.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25903.json b/2021/25xxx/CVE-2021-25903.json new file mode 100644 index 00000000000..c5ff5ab2c9a --- /dev/null +++ b/2021/25xxx/CVE-2021-25903.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-25903", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0006.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0006.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25904.json b/2021/25xxx/CVE-2021-25904.json new file mode 100644 index 00000000000..fc6397a7de7 --- /dev/null +++ b/2021/25xxx/CVE-2021-25904.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-25904", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the av-data crate before 0.3.0 for Rust. A raw pointer is dereferenced, leading to a read of an arbitrary memory address, sometimes causing a segfault." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0007.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0007.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25950.json b/2021/25xxx/CVE-2021-25950.json new file mode 100644 index 00000000000..51da7945e13 --- /dev/null +++ b/2021/25xxx/CVE-2021-25950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25951.json b/2021/25xxx/CVE-2021-25951.json new file mode 100644 index 00000000000..19f7f8f3533 --- /dev/null +++ b/2021/25xxx/CVE-2021-25951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25952.json b/2021/25xxx/CVE-2021-25952.json new file mode 100644 index 00000000000..ced2791526b --- /dev/null +++ b/2021/25xxx/CVE-2021-25952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25953.json b/2021/25xxx/CVE-2021-25953.json new file mode 100644 index 00000000000..bbbd7f59e51 --- /dev/null +++ b/2021/25xxx/CVE-2021-25953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25954.json b/2021/25xxx/CVE-2021-25954.json new file mode 100644 index 00000000000..d7e7eeada5e --- /dev/null +++ b/2021/25xxx/CVE-2021-25954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25955.json b/2021/25xxx/CVE-2021-25955.json new file mode 100644 index 00000000000..4fa2cb4a757 --- /dev/null +++ b/2021/25xxx/CVE-2021-25955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25956.json b/2021/25xxx/CVE-2021-25956.json new file mode 100644 index 00000000000..bf89de72d1a --- /dev/null +++ b/2021/25xxx/CVE-2021-25956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25957.json b/2021/25xxx/CVE-2021-25957.json new file mode 100644 index 00000000000..5f947912ff4 --- /dev/null +++ b/2021/25xxx/CVE-2021-25957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25958.json b/2021/25xxx/CVE-2021-25958.json new file mode 100644 index 00000000000..e017fb6b259 --- /dev/null +++ b/2021/25xxx/CVE-2021-25958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25959.json b/2021/25xxx/CVE-2021-25959.json new file mode 100644 index 00000000000..31a37b6f5b5 --- /dev/null +++ b/2021/25xxx/CVE-2021-25959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25960.json b/2021/25xxx/CVE-2021-25960.json new file mode 100644 index 00000000000..5e73b4dd5a1 --- /dev/null +++ b/2021/25xxx/CVE-2021-25960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25961.json b/2021/25xxx/CVE-2021-25961.json new file mode 100644 index 00000000000..4226ab88ee0 --- /dev/null +++ b/2021/25xxx/CVE-2021-25961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25962.json b/2021/25xxx/CVE-2021-25962.json new file mode 100644 index 00000000000..c34e9d2e869 --- /dev/null +++ b/2021/25xxx/CVE-2021-25962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25963.json b/2021/25xxx/CVE-2021-25963.json new file mode 100644 index 00000000000..d5ba400b8bf --- /dev/null +++ b/2021/25xxx/CVE-2021-25963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25964.json b/2021/25xxx/CVE-2021-25964.json new file mode 100644 index 00000000000..a171092e39d --- /dev/null +++ b/2021/25xxx/CVE-2021-25964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25965.json b/2021/25xxx/CVE-2021-25965.json new file mode 100644 index 00000000000..c4df18a4f45 --- /dev/null +++ b/2021/25xxx/CVE-2021-25965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25966.json b/2021/25xxx/CVE-2021-25966.json new file mode 100644 index 00000000000..a37d83e6484 --- /dev/null +++ b/2021/25xxx/CVE-2021-25966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25967.json b/2021/25xxx/CVE-2021-25967.json new file mode 100644 index 00000000000..659a112a3af --- /dev/null +++ b/2021/25xxx/CVE-2021-25967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25968.json b/2021/25xxx/CVE-2021-25968.json new file mode 100644 index 00000000000..72c738429eb --- /dev/null +++ b/2021/25xxx/CVE-2021-25968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25969.json b/2021/25xxx/CVE-2021-25969.json new file mode 100644 index 00000000000..b5403282aef --- /dev/null +++ b/2021/25xxx/CVE-2021-25969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25970.json b/2021/25xxx/CVE-2021-25970.json new file mode 100644 index 00000000000..ea199fe866e --- /dev/null +++ b/2021/25xxx/CVE-2021-25970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25971.json b/2021/25xxx/CVE-2021-25971.json new file mode 100644 index 00000000000..98e8d3734fe --- /dev/null +++ b/2021/25xxx/CVE-2021-25971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25972.json b/2021/25xxx/CVE-2021-25972.json new file mode 100644 index 00000000000..2a27ad6bddb --- /dev/null +++ b/2021/25xxx/CVE-2021-25972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25973.json b/2021/25xxx/CVE-2021-25973.json new file mode 100644 index 00000000000..6914bc648f8 --- /dev/null +++ b/2021/25xxx/CVE-2021-25973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25974.json b/2021/25xxx/CVE-2021-25974.json new file mode 100644 index 00000000000..e219020cc5d --- /dev/null +++ b/2021/25xxx/CVE-2021-25974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25975.json b/2021/25xxx/CVE-2021-25975.json new file mode 100644 index 00000000000..db6c92afea7 --- /dev/null +++ b/2021/25xxx/CVE-2021-25975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25976.json b/2021/25xxx/CVE-2021-25976.json new file mode 100644 index 00000000000..4b600fd0fd5 --- /dev/null +++ b/2021/25xxx/CVE-2021-25976.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25976", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25977.json b/2021/25xxx/CVE-2021-25977.json new file mode 100644 index 00000000000..117410fb57d --- /dev/null +++ b/2021/25xxx/CVE-2021-25977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25978.json b/2021/25xxx/CVE-2021-25978.json new file mode 100644 index 00000000000..e9096a67caa --- /dev/null +++ b/2021/25xxx/CVE-2021-25978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25979.json b/2021/25xxx/CVE-2021-25979.json new file mode 100644 index 00000000000..9f9f57dd027 --- /dev/null +++ b/2021/25xxx/CVE-2021-25979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25980.json b/2021/25xxx/CVE-2021-25980.json new file mode 100644 index 00000000000..d7197e8bef3 --- /dev/null +++ b/2021/25xxx/CVE-2021-25980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25981.json b/2021/25xxx/CVE-2021-25981.json new file mode 100644 index 00000000000..6c5a2f2a743 --- /dev/null +++ b/2021/25xxx/CVE-2021-25981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25982.json b/2021/25xxx/CVE-2021-25982.json new file mode 100644 index 00000000000..797c6e9b209 --- /dev/null +++ b/2021/25xxx/CVE-2021-25982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25983.json b/2021/25xxx/CVE-2021-25983.json new file mode 100644 index 00000000000..27334eb8a5f --- /dev/null +++ b/2021/25xxx/CVE-2021-25983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25984.json b/2021/25xxx/CVE-2021-25984.json new file mode 100644 index 00000000000..fb16e845321 --- /dev/null +++ b/2021/25xxx/CVE-2021-25984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25985.json b/2021/25xxx/CVE-2021-25985.json new file mode 100644 index 00000000000..1be3941b693 --- /dev/null +++ b/2021/25xxx/CVE-2021-25985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-25985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3193.json b/2021/3xxx/CVE-2021-3193.json index cab1cb6e04d..3e1ab247f2b 100644 --- a/2021/3xxx/CVE-2021-3193.json +++ b/2021/3xxx/CVE-2021-3193.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper access and command validation in the Nagios Docker config wizard before 1.1.2, as used in Nagios XI through 5.7, allows an unauthenticated attacker to execute remote code as the apache user." + "value": "Improper access and command validation in the Docker config wizard of Nagios XI before 5.8.0 allows an authenticated attacker to execute remote code as the apache user." } ] }, diff --git a/2021/3xxx/CVE-2021-3199.json b/2021/3xxx/CVE-2021-3199.json index c86e161e540..410b0c2d759 100644 --- a/2021/3xxx/CVE-2021-3199.json +++ b/2021/3xxx/CVE-2021-3199.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3199", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3199", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/ONLYOFFICE/DocumentServer/blob/903fe5ab7a275bd69c3c3346af2d21cf87ebeabf/CHANGELOG.md#563", + "url": "https://github.com/ONLYOFFICE/DocumentServer/blob/903fe5ab7a275bd69c3c3346af2d21cf87ebeabf/CHANGELOG.md#563" + }, + { + "refsource": "MISC", + "name": "https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py", + "url": "https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py" } ] } diff --git a/2021/3xxx/CVE-2021-3200.json b/2021/3xxx/CVE-2021-3200.json new file mode 100644 index 00000000000..2ea63bd91bb --- /dev/null +++ b/2021/3xxx/CVE-2021-3200.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3200", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3201.json b/2021/3xxx/CVE-2021-3201.json new file mode 100644 index 00000000000..3166a1724f9 --- /dev/null +++ b/2021/3xxx/CVE-2021-3201.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3201", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3202.json b/2021/3xxx/CVE-2021-3202.json new file mode 100644 index 00000000000..ff9d2a4b0fe --- /dev/null +++ b/2021/3xxx/CVE-2021-3202.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3202", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3203.json b/2021/3xxx/CVE-2021-3203.json new file mode 100644 index 00000000000..d4bb9e11142 --- /dev/null +++ b/2021/3xxx/CVE-2021-3203.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3203", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3204.json b/2021/3xxx/CVE-2021-3204.json new file mode 100644 index 00000000000..a9fd1824f0b --- /dev/null +++ b/2021/3xxx/CVE-2021-3204.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3204", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3205.json b/2021/3xxx/CVE-2021-3205.json new file mode 100644 index 00000000000..391c63630f9 --- /dev/null +++ b/2021/3xxx/CVE-2021-3205.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3205", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3206.json b/2021/3xxx/CVE-2021-3206.json new file mode 100644 index 00000000000..8cde8bbee00 --- /dev/null +++ b/2021/3xxx/CVE-2021-3206.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3206", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file