From 2a5071740ab4cdf82c94d615a710281976b2b01c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 3 May 2021 14:00:45 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/29xxx/CVE-2021-29238.json | 66 ++++++++++++++++++++++++++++++---- 2021/29xxx/CVE-2021-29239.json | 66 ++++++++++++++++++++++++++++++---- 2021/29xxx/CVE-2021-29241.json | 66 ++++++++++++++++++++++++++++++---- 2021/29xxx/CVE-2021-29242.json | 66 ++++++++++++++++++++++++++++++---- 4 files changed, 240 insertions(+), 24 deletions(-) diff --git a/2021/29xxx/CVE-2021-29238.json b/2021/29xxx/CVE-2021-29238.json index 11b86e0bf31..5a0c3dcf475 100644 --- a/2021/29xxx/CVE-2021-29238.json +++ b/2021/29xxx/CVE-2021-29238.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29238", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-29238", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://customers.codesys.com/index.php", + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php" + }, + { + "refsource": "MISC", + "name": "https://www.codesys.com/security/security-reports.html", + "url": "https://www.codesys.com/security/security-reports.html" + }, + { + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14638&token=30b75ee95d0d94527894dfd8cdc5432575a8eff8&download=", + "url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14638&token=30b75ee95d0d94527894dfd8cdc5432575a8eff8&download=" } ] } diff --git a/2021/29xxx/CVE-2021-29239.json b/2021/29xxx/CVE-2021-29239.json index f92ed570c8e..945eedbcf30 100644 --- a/2021/29xxx/CVE-2021-29239.json +++ b/2021/29xxx/CVE-2021-29239.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29239", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-29239", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://customers.codesys.com/index.php", + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php" + }, + { + "refsource": "MISC", + "name": "https://www.codesys.com/security/security-reports.html", + "url": "https://www.codesys.com/security/security-reports.html" + }, + { + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14639&token=fa836f8bd4a2184aa9323a639ca9f2aaf1538412&download=", + "url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14639&token=fa836f8bd4a2184aa9323a639ca9f2aaf1538412&download=" } ] } diff --git a/2021/29xxx/CVE-2021-29241.json b/2021/29xxx/CVE-2021-29241.json index bcfceacec21..03cc88c1caa 100644 --- a/2021/29xxx/CVE-2021-29241.json +++ b/2021/29xxx/CVE-2021-29241.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29241", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-29241", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CODESYS Gateway 3 before 3.5.17.0 has a NULL pointer dereference that may result in a denial of service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://customers.codesys.com/index.php", + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php" + }, + { + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14637&token=8dbd75ae7553ae3be25e22f741db783b31e14799&download=", + "url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14637&token=8dbd75ae7553ae3be25e22f741db783b31e14799&download=" + }, + { + "refsource": "MISC", + "name": "https://www.codesys.com/security/security-reports.html", + "url": "https://www.codesys.com/security/security-reports.html" } ] } diff --git a/2021/29xxx/CVE-2021-29242.json b/2021/29xxx/CVE-2021-29242.json index 584bea773b9..ffb28bcba90 100644 --- a/2021/29xxx/CVE-2021-29242.json +++ b/2021/29xxx/CVE-2021-29242.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29242", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-29242", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://customers.codesys.com/index.php", + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php" + }, + { + "refsource": "MISC", + "name": "https://www.codesys.com/security/security-reports.html", + "url": "https://www.codesys.com/security/security-reports.html" + }, + { + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14640&token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873&download=", + "url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14640&token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873&download=" } ] }