diff --git a/2021/37xxx/CVE-2021-37202.json b/2021/37xxx/CVE-2021-37202.json index b79f0baeffa..d20962aaf9b 100644 --- a/2021/37xxx/CVE-2021-37202.json +++ b/2021/37xxx/CVE-2021-37202.json @@ -68,9 +68,10 @@ "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf" }, { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } -} +} \ No newline at end of file diff --git a/2021/37xxx/CVE-2021-37203.json b/2021/37xxx/CVE-2021-37203.json index 8adcfc10e5b..35f39a6ead1 100644 --- a/2021/37xxx/CVE-2021-37203.json +++ b/2021/37xxx/CVE-2021-37203.json @@ -68,9 +68,10 @@ "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf" }, { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } -} +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41533.json b/2021/41xxx/CVE-2021-41533.json index f12b850a3d3..40cc7e1d973 100644 --- a/2021/41xxx/CVE-2021-41533.json +++ b/2021/41xxx/CVE-2021-41533.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files.\n\nAn attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41534.json b/2021/41xxx/CVE-2021-41534.json index fd74638dda8..0d69502739d 100644 --- a/2021/41xxx/CVE-2021-41534.json +++ b/2021/41xxx/CVE-2021-41534.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files.\n\nAn attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41535.json b/2021/41xxx/CVE-2021-41535.json index ea9956e4ee5..f7827337788 100644 --- a/2021/41xxx/CVE-2021-41535.json +++ b/2021/41xxx/CVE-2021-41535.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files.\n\nAn attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41536.json b/2021/41xxx/CVE-2021-41536.json index 5cebbde930f..2125030589e 100644 --- a/2021/41xxx/CVE-2021-41536.json +++ b/2021/41xxx/CVE-2021-41536.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files.\n\nAn attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13778).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13778)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41537.json b/2021/41xxx/CVE-2021-41537.json index 3408d979feb..51ab7284ef2 100644 --- a/2021/41xxx/CVE-2021-41537.json +++ b/2021/41xxx/CVE-2021-41537.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files.\n\nAn attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13789).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13789)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41538.json b/2021/41xxx/CVE-2021-41538.json index d4ff95acf46..9e2ef09b8bf 100644 --- a/2021/41xxx/CVE-2021-41538.json +++ b/2021/41xxx/CVE-2021-41538.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files.\n\nAn attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41539.json b/2021/41xxx/CVE-2021-41539.json index 43b40bbf085..f80b82778b3 100644 --- a/2021/41xxx/CVE-2021-41539.json +++ b/2021/41xxx/CVE-2021-41539.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files.\n\nAn attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13773).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13773)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41540.json b/2021/41xxx/CVE-2021-41540.json index f1033a9375e..d03a56b64d9 100644 --- a/2021/41xxx/CVE-2021-41540.json +++ b/2021/41xxx/CVE-2021-41540.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files.\n\nAn attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13776).\n" + "value": "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13776)." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" } ] }