diff --git a/2020/28xxx/CVE-2020-28328.json b/2020/28xxx/CVE-2020-28328.json index 6fa888cedb6..e8b9ef8b99e 100644 --- a/2020/28xxx/CVE-2020-28328.json +++ b/2020/28xxx/CVE-2020-28328.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html" } ] } diff --git a/2021/22xxx/CVE-2021-22204.json b/2021/22xxx/CVE-2021-22204.json index 3306efaa256..fdfae2630e6 100644 --- a/2021/22xxx/CVE-2021-22204.json +++ b/2021/22xxx/CVE-2021-22204.json @@ -98,6 +98,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210516 [SECURITY] [DLA 2663-1] libimage-exiftool-perl security update", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00018.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html", + "url": "http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22205.json b/2021/22xxx/CVE-2021-22205.json index d48969c18ad..63d99447a78 100644 --- a/2021/22xxx/CVE-2021-22205.json +++ b/2021/22xxx/CVE-2021-22205.json @@ -64,6 +64,16 @@ "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22205.json", "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22205.json", "refsource": "CONFIRM" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html", + "url": "http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html" } ] }, diff --git a/2021/32xxx/CVE-2021-32234.json b/2021/32xxx/CVE-2021-32234.json index 7a19c3bcb95..6e005cfe699 100644 --- a/2021/32xxx/CVE-2021-32234.json +++ b/2021/32xxx/CVE-2021-32234.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-32234", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-32234", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.smartertools.com/smartermail/release-notes/current", + "refsource": "MISC", + "name": "https://www.smartertools.com/smartermail/release-notes/current" + }, + { + "url": "https://csirt.divd.nl/cases/DIVD-2021-00006/", + "refsource": "MISC", + "name": "https://csirt.divd.nl/cases/DIVD-2021-00006/" } ] } diff --git a/2021/35xxx/CVE-2021-35323.json b/2021/35xxx/CVE-2021-35323.json index 094dc7a5537..47c49c0b93d 100644 --- a/2021/35xxx/CVE-2021-35323.json +++ b/2021/35xxx/CVE-2021-35323.json @@ -56,6 +56,11 @@ "url": "https://github.com/bludit/bludit/issues/1327", "refsource": "MISC", "name": "https://github.com/bludit/bludit/issues/1327" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html" } ] } diff --git a/2021/3xxx/CVE-2021-3968.json b/2021/3xxx/CVE-2021-3968.json new file mode 100644 index 00000000000..10d7874e2b0 --- /dev/null +++ b/2021/3xxx/CVE-2021-3968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3969.json b/2021/3xxx/CVE-2021-3969.json new file mode 100644 index 00000000000..2eae888e2b4 --- /dev/null +++ b/2021/3xxx/CVE-2021-3969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3970.json b/2021/3xxx/CVE-2021-3970.json new file mode 100644 index 00000000000..0162bb7deda --- /dev/null +++ b/2021/3xxx/CVE-2021-3970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3971.json b/2021/3xxx/CVE-2021-3971.json new file mode 100644 index 00000000000..523c5c8ebdc --- /dev/null +++ b/2021/3xxx/CVE-2021-3971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3972.json b/2021/3xxx/CVE-2021-3972.json new file mode 100644 index 00000000000..f1a7d2ac9a7 --- /dev/null +++ b/2021/3xxx/CVE-2021-3972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42840.json b/2021/42xxx/CVE-2021-42840.json index 3199db8c5c4..5062bb935fc 100644 --- a/2021/42xxx/CVE-2021-42840.json +++ b/2021/42xxx/CVE-2021-42840.json @@ -71,6 +71,11 @@ "url": "https://theyhack.me/SuiteCRM-RCE-2/", "refsource": "MISC", "name": "https://theyhack.me/SuiteCRM-RCE-2/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html" } ] } diff --git a/2021/43xxx/CVE-2021-43397.json b/2021/43xxx/CVE-2021-43397.json index 5ab62ca9b25..29a46591015 100644 --- a/2021/43xxx/CVE-2021-43397.json +++ b/2021/43xxx/CVE-2021-43397.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://man.liquidfiles.com/release_notes/version_3-6-x.html", "url": "https://man.liquidfiles.com/release_notes/version_3-6-x.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html" } ] } diff --git a/2021/43xxx/CVE-2021-43971.json b/2021/43xxx/CVE-2021-43971.json new file mode 100644 index 00000000000..fc6502b7dc2 --- /dev/null +++ b/2021/43xxx/CVE-2021-43971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43972.json b/2021/43xxx/CVE-2021-43972.json new file mode 100644 index 00000000000..607c5f50723 --- /dev/null +++ b/2021/43xxx/CVE-2021-43972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43973.json b/2021/43xxx/CVE-2021-43973.json new file mode 100644 index 00000000000..792e38969f4 --- /dev/null +++ b/2021/43xxx/CVE-2021-43973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43974.json b/2021/43xxx/CVE-2021-43974.json new file mode 100644 index 00000000000..0c1df3227de --- /dev/null +++ b/2021/43xxx/CVE-2021-43974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43975.json b/2021/43xxx/CVE-2021-43975.json new file mode 100644 index 00000000000..dd9e9e093b4 --- /dev/null +++ b/2021/43xxx/CVE-2021-43975.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-43975", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/", + "refsource": "MISC", + "name": "https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/" + }, + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496" + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43976.json b/2021/43xxx/CVE-2021-43976.json new file mode 100644 index 00000000000..1901620b15e --- /dev/null +++ b/2021/43xxx/CVE-2021-43976.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-43976", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/", + "refsource": "MISC", + "name": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/" + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43977.json b/2021/43xxx/CVE-2021-43977.json new file mode 100644 index 00000000000..03bde2788f3 --- /dev/null +++ b/2021/43xxx/CVE-2021-43977.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-43977", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.smartertools.com/smartermail/release-notes/current", + "refsource": "MISC", + "name": "https://www.smartertools.com/smartermail/release-notes/current" + }, + { + "url": "https://csirt.divd.nl/cases/DIVD-2021-00006/", + "refsource": "MISC", + "name": "https://csirt.divd.nl/cases/DIVD-2021-00006/" + } + ] + } +} \ No newline at end of file