From 2eded337299ff4cf79bd4a0f890b8fac248af34f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 15:00:39 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/23xxx/CVE-2020-23967.json | 66 ++++++++++++++++++++++++++++++---- 2020/25xxx/CVE-2020-25657.json | 6 ++-- 2021/23xxx/CVE-2021-23339.json | 9 +++-- 2021/27xxx/CVE-2021-27222.json | 66 ++++++++++++++++++++++++++++++---- 4 files changed, 127 insertions(+), 20 deletions(-) diff --git a/2020/23xxx/CVE-2020-23967.json b/2020/23xxx/CVE-2020-23967.json index 11938f79afb..83aab3c6a1d 100644 --- a/2020/23xxx/CVE-2020-23967.json +++ b/2020/23xxx/CVE-2020-23967.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23967", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23967", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dr.Web Security Space versions 11 and 12 allow elevation of privilege for local users without administrative privileges to NT AUTHORITY\\SYSTEM due to insufficient control during autoupdate." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://amonitoring.ru/article/drweb/", + "refsource": "MISC", + "name": "https://amonitoring.ru/article/drweb/" + }, + { + "url": "https://habr.com/ru/company/pm/blog/509592/", + "refsource": "MISC", + "name": "https://habr.com/ru/company/pm/blog/509592/" + }, + { + "url": "https://www.youtube.com/watch?v=q7Kqi7kE59U", + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=q7Kqi7kE59U" } ] } diff --git a/2020/25xxx/CVE-2020-25657.json b/2020/25xxx/CVE-2020-25657.json index bf7441a5c2f..5a6114e6471 100644 --- a/2020/25xxx/CVE-2020-25657.json +++ b/2020/25xxx/CVE-2020-25657.json @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "all versions" + "version_value": "All released versions of m2crypto" } ] } @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823,https://gitlab.com/m2crypto/m2crypto/-/issues/285", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823,https://gitlab.com/m2crypto/m2crypto/-/issues/285" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823" } ] }, diff --git a/2021/23xxx/CVE-2021-23339.json b/2021/23xxx/CVE-2021-23339.json index 7b52156d0c1..f92ed823492 100644 --- a/2021/23xxx/CVE-2021-23339.json +++ b/2021/23xxx/CVE-2021-23339.json @@ -13,6 +13,7 @@ "vendor": { "vendor_data": [ { + "vendor_name": "n/a", "product": { "product_data": [ { @@ -20,15 +21,13 @@ "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "0" + "version_value": "all versions before 10.1.14 and from 10.2.0 to 10.2.4" } ] } } ] - }, - "vendor_name": "n/a" + } } ] } @@ -63,7 +62,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package com.typesafe.akka:akka-http-core. It allows multiple Transfer-Encoding headers." + "value": "This affects all versions before 10.1.14 and from 10.2.0 to 10.2.4 of package com.typesafe.akka:akka-http-core. It allows multiple Transfer-Encoding headers." } ] }, diff --git a/2021/27xxx/CVE-2021-27222.json b/2021/27xxx/CVE-2021-27222.json index 740145bdac7..d28f8e62b83 100644 --- a/2021/27xxx/CVE-2021-27222.json +++ b/2021/27xxx/CVE-2021-27222.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27222", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27222", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the \"Time in Status\" app before 4.13.0 for Jira, remote authenticated attackers can cause Stored XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://marketplace.atlassian.com/apps/1211756/time-in-status/version-history", + "refsource": "MISC", + "name": "https://marketplace.atlassian.com/apps/1211756/time-in-status/version-history" + }, + { + "refsource": "MISC", + "name": "https://dev.obss.com.tr/confluence/display/MD/2021-02-25+Time+in+Status+for+Jira+Server+and+Data+Center+Security+Advisory", + "url": "https://dev.obss.com.tr/confluence/display/MD/2021-02-25+Time+in+Status+for+Jira+Server+and+Data+Center+Security+Advisory" + }, + { + "refsource": "MISC", + "name": "https://dev.obss.com.tr/jira/browse/APDTIS-1097?src=confmacro", + "url": "https://dev.obss.com.tr/jira/browse/APDTIS-1097?src=confmacro" } ] }