From 2f53bbaa5c206905cee9c0c9cfad85c71440648e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 16 Jun 2021 17:00:55 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/22xxx/CVE-2020-22199.json | 56 +++++++++-- 2020/22xxx/CVE-2020-22200.json | 56 +++++++++-- 2020/22xxx/CVE-2020-22201.json | 56 +++++++++-- 2021/20xxx/CVE-2021-20483.json | 174 ++++++++++++++++---------------- 2021/20xxx/CVE-2021-20488.json | 174 ++++++++++++++++---------------- 2021/20xxx/CVE-2021-20566.json | 172 +++++++++++++++---------------- 2021/20xxx/CVE-2021-20567.json | 174 ++++++++++++++++---------------- 2021/29xxx/CVE-2021-29702.json | 178 ++++++++++++++++----------------- 2021/34xxx/CVE-2021-34808.json | 18 ++++ 2021/34xxx/CVE-2021-34809.json | 18 ++++ 2021/34xxx/CVE-2021-34810.json | 18 ++++ 2021/34xxx/CVE-2021-34811.json | 18 ++++ 2021/34xxx/CVE-2021-34812.json | 18 ++++ 13 files changed, 676 insertions(+), 454 deletions(-) create mode 100644 2021/34xxx/CVE-2021-34808.json create mode 100644 2021/34xxx/CVE-2021-34809.json create mode 100644 2021/34xxx/CVE-2021-34810.json create mode 100644 2021/34xxx/CVE-2021-34811.json create mode 100644 2021/34xxx/CVE-2021-34812.json diff --git a/2020/22xxx/CVE-2020-22199.json b/2020/22xxx/CVE-2020-22199.json index 2dccaadffa4..4a4863b6157 100644 --- a/2020/22xxx/CVE-2020-22199.json +++ b/2020/22xxx/CVE-2020-22199.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-22199", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-22199", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in phpCMS 2007 SP6 build 0805 via the digg_mod parameter to digg_add.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/blindkey/cve_like/issues/1", + "refsource": "MISC", + "name": "https://github.com/blindkey/cve_like/issues/1" } ] } diff --git a/2020/22xxx/CVE-2020-22200.json b/2020/22xxx/CVE-2020-22200.json index 0c32191c8f3..6de8d6dfe8b 100644 --- a/2020/22xxx/CVE-2020-22200.json +++ b/2020/22xxx/CVE-2020-22200.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-22200", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-22200", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory Traversal vulnerability in phpCMS 9.1.13 via the q parameter to public_get_suggest_keyword." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/blindkey/cve_like/issues/2", + "refsource": "MISC", + "name": "https://github.com/blindkey/cve_like/issues/2" } ] } diff --git a/2020/22xxx/CVE-2020-22201.json b/2020/22xxx/CVE-2020-22201.json index 979f14ce18f..c0cf36666d7 100644 --- a/2020/22xxx/CVE-2020-22201.json +++ b/2020/22xxx/CVE-2020-22201.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-22201", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-22201", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "phpCMS 2008 sp4 allowas remote malicious users to execute arbitrary php commands via the pagesize parameter to yp/product.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/blindkey/cve_like/issues/4", + "refsource": "MISC", + "name": "https://github.com/blindkey/cve_like/issues/4" } ] } diff --git a/2021/20xxx/CVE-2021-20483.json b/2021/20xxx/CVE-2021-20483.json index f2f5e826862..9070465ecf6 100644 --- a/2021/20xxx/CVE-2021-20483.json +++ b/2021/20xxx/CVE-2021-20483.json @@ -1,90 +1,90 @@ { - "data_type" : "CVE", - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Gain Access" - } - ] - } - ] - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "value" : "IBM Security Identity Manager 6.0.2 is vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to obtain sensitive data. IBM X-Force ID: 197591.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_type": "CVE", + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Security Identity Manager", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - } - ] - } - } - ] - } + "description": [ + { + "lang": "eng", + "value": "Gain Access" + } + ] } - ] - } - }, - "impact" : { - "cvssv3" : { - "BM" : { - "AC" : "L", - "S" : "U", - "A" : "N", - "I" : "L", - "C" : "N", - "AV" : "N", - "PR" : "N", - "SCORE" : "5.300", - "UI" : "N" - }, - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - } - } - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6464081", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6464081 (Security Identity Manager)", - "name" : "https://www.ibm.com/support/pages/node/6464081" - }, - { - "name" : "ibm-sim-cve202120483-ssrf (197591)", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/197591" - } - ] - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-06-15T00:00:00", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2021-20483" - } -} + ] + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "value": "IBM Security Identity Manager 6.0.2 is vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to obtain sensitive data. IBM X-Force ID: 197591.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Security Identity Manager", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "BM": { + "AC": "L", + "S": "U", + "A": "N", + "I": "L", + "C": "N", + "AV": "N", + "PR": "N", + "SCORE": "5.300", + "UI": "N" + }, + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + } + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6464081", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6464081 (Security Identity Manager)", + "name": "https://www.ibm.com/support/pages/node/6464081" + }, + { + "name": "ibm-sim-cve202120483-ssrf (197591)", + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/197591" + } + ] + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-06-15T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-20483" + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20488.json b/2021/20xxx/CVE-2021-20488.json index 907e137e7e7..03197bc4087 100644 --- a/2021/20xxx/CVE-2021-20488.json +++ b/2021/20xxx/CVE-2021-20488.json @@ -1,90 +1,90 @@ { - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Gain Access", - "lang" : "eng" - } - ] - } - ] - }, - "data_version" : "4.0", - "data_type" : "CVE", - "CVE_data_meta" : { - "ID" : "CVE-2021-20488", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-06-15T00:00:00" - }, - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6464081", - "url" : "https://www.ibm.com/support/pages/node/6464081", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6464081 (Security Identity Manager)" - }, - { - "name" : "ibm-sim-cve202120488-gain-access (197789)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/197789", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "product_name" : "Security Identity Manager", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "value": "Gain Access", + "lang": "eng" + } + ] } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RL" : "O", - "RC" : "C" - }, - "BM" : { - "AV" : "N", - "C" : "H", - "PR" : "L", - "SCORE" : "7.500", - "UI" : "N", - "A" : "H", - "S" : "U", - "AC" : "H", - "I" : "H" - } - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Security Identity Manager 6.0.2 could allow an authenticated malicious user to change the passowrds of other users in the Windows AD enviornemnt when IBM Security Identity Manager Windows Password Synch Plug-in is deployed and configured. IBM X-Force ID: 197789." - } - ] - } -} + ] + }, + "data_version": "4.0", + "data_type": "CVE", + "CVE_data_meta": { + "ID": "CVE-2021-20488", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-06-15T00:00:00" + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6464081", + "url": "https://www.ibm.com/support/pages/node/6464081", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6464081 (Security Identity Manager)" + }, + { + "name": "ibm-sim-cve202120488-gain-access (197789)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/197789", + "refsource": "XF", + "title": "X-Force Vulnerability Report" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Security Identity Manager", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RL": "O", + "RC": "C" + }, + "BM": { + "AV": "N", + "C": "H", + "PR": "L", + "SCORE": "7.500", + "UI": "N", + "A": "H", + "S": "U", + "AC": "H", + "I": "H" + } + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Security Identity Manager 6.0.2 could allow an authenticated malicious user to change the passowrds of other users in the Windows AD enviornemnt when IBM Security Identity Manager Windows Password Synch Plug-in is deployed and configured. IBM X-Force ID: 197789." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20566.json b/2021/20xxx/CVE-2021-20566.json index 27f289012cc..18fc1073233 100644 --- a/2021/20xxx/CVE-2021-20566.json +++ b/2021/20xxx/CVE-2021-20566.json @@ -1,90 +1,90 @@ { - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Resilient SOAR V38.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 199238." - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "description": { + "description_data": [ { - "product" : { - "product_data" : [ - { - "product_name" : "Resilient SOAR", - "version" : { - "version_data" : [ - { - "version_value" : "38" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "lang": "eng", + "value": "IBM Resilient SOAR V38.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 199238." } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "A" : "N", - "S" : "U", - "AC" : "H", - "I" : "N", - "SCORE" : "5.900", - "PR" : "N", - "UI" : "N", - "AV" : "N", - "C" : "H" - } - } - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6464043 (Resilient OnPrem)", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6464043", - "name" : "https://www.ibm.com/support/pages/node/6464043" - }, - { - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/199238", - "name" : "ibm-resilient-cve202120566-info-disc (199238)" - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2021-20566", - "DATE_PUBLIC" : "2021-06-15T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "data_type" : "CVE", - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Resilient SOAR", + "version": { + "version_data": [ + { + "version_value": "38" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "data_format" : "MITRE" -} + } + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "A": "N", + "S": "U", + "AC": "H", + "I": "N", + "SCORE": "5.900", + "PR": "N", + "UI": "N", + "AV": "N", + "C": "H" + } + } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6464043 (Resilient OnPrem)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6464043", + "name": "https://www.ibm.com/support/pages/node/6464043" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199238", + "name": "ibm-resilient-cve202120566-info-disc (199238)" + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2021-20566", + "DATE_PUBLIC": "2021-06-15T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "data_type": "CVE", + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20567.json b/2021/20xxx/CVE-2021-20567.json index 06e7516bb97..eb115afe1eb 100644 --- a/2021/20xxx/CVE-2021-20567.json +++ b/2021/20xxx/CVE-2021-20567.json @@ -1,90 +1,90 @@ { - "data_version" : "4.0", - "data_type" : "CVE", - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "SCORE" : "4.400", - "PR" : "H", - "UI" : "N", - "AV" : "L", - "C" : "H", - "A" : "N", - "S" : "U", - "AC" : "L", - "I" : "N" - } - } - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "38" - } - ] - }, - "product_name" : "Resilient SOAR" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] } - ] - } - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6464039 (Resilient OnPrem)", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6464039", - "name" : "https://www.ibm.com/support/pages/node/6464039" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/199239", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "name" : "ibm-resilient-cve202120567-info-disc (199239)" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Resilient SOAR V38.0 could allow a local privileged attacker to obtain sensitive information due to improper or nonexisting encryption.IBM X-Force ID: 199239." - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-06-15T00:00:00", - "ID" : "CVE-2021-20567" - } -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "SCORE": "4.400", + "PR": "H", + "UI": "N", + "AV": "L", + "C": "H", + "A": "N", + "S": "U", + "AC": "L", + "I": "N" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "38" + } + ] + }, + "product_name": "Resilient SOAR" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6464039 (Resilient OnPrem)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6464039", + "name": "https://www.ibm.com/support/pages/node/6464039" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199239", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "name": "ibm-resilient-cve202120567-info-disc (199239)" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Resilient SOAR V38.0 could allow a local privileged attacker to obtain sensitive information due to improper or nonexisting encryption.IBM X-Force ID: 199239." + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-06-15T00:00:00", + "ID": "CVE-2021-20567" + } +} \ No newline at end of file diff --git a/2021/29xxx/CVE-2021-29702.json b/2021/29xxx/CVE-2021-29702.json index 48f3341caf6..1e3f1c5e39f 100644 --- a/2021/29xxx/CVE-2021-29702.json +++ b/2021/29xxx/CVE-2021-29702.json @@ -1,93 +1,93 @@ { - "CVE_data_meta" : { - "ID" : "CVE-2021-29702", - "DATE_PUBLIC" : "2021-06-15T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1.4 and 11.5.5 is vulnerable to a denial of service as the server terminates abnormally when executing a specially crafted SELECT statement. IBM X-Force ID: 200658." - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "CVE_data_meta": { + "ID": "CVE-2021-29702", + "DATE_PUBLIC": "2021-06-15T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "11.1.4" - }, - { - "version_value" : "11.5.5" - } - ] - }, - "product_name" : "DB2 for Linux- UNIX and Windows" - } - ] - } + "lang": "eng", + "value": "Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1.4 and 11.5.5 is vulnerable to a denial of service as the server terminates abnormally when executing a specially crafted SELECT statement. IBM X-Force ID: 200658." } - ] - } - }, - "impact" : { - "cvssv3" : { - "BM" : { - "AV" : "N", - "C" : "N", - "PR" : "N", - "SCORE" : "7.500", - "UI" : "N", - "S" : "U", - "A" : "H", - "AC" : "L", - "I" : "N" - }, - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - } - } - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6463985", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6463985 (DB2 for Linux- UNIX and Windows)", - "name" : "https://www.ibm.com/support/pages/node/6463985" - }, - { - "name" : "ibm-db2-cve202129702-dos (200658)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/200658", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Denial of Service", - "lang" : "eng" - } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "11.1.4" + }, + { + "version_value": "11.5.5" + } + ] + }, + "product_name": "DB2 for Linux- UNIX and Windows" + } + ] + } + } ] - } - ] - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0" -} + } + }, + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "C": "N", + "PR": "N", + "SCORE": "7.500", + "UI": "N", + "S": "U", + "A": "H", + "AC": "L", + "I": "N" + }, + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + } + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6463985", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6463985 (DB2 for Linux- UNIX and Windows)", + "name": "https://www.ibm.com/support/pages/node/6463985" + }, + { + "name": "ibm-db2-cve202129702-dos (200658)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/200658", + "refsource": "XF", + "title": "X-Force Vulnerability Report" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Denial of Service", + "lang": "eng" + } + ] + } + ] + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0" +} \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34808.json b/2021/34xxx/CVE-2021-34808.json new file mode 100644 index 00000000000..58cf074e53b --- /dev/null +++ b/2021/34xxx/CVE-2021-34808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-34808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34809.json b/2021/34xxx/CVE-2021-34809.json new file mode 100644 index 00000000000..c971fea406a --- /dev/null +++ b/2021/34xxx/CVE-2021-34809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-34809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34810.json b/2021/34xxx/CVE-2021-34810.json new file mode 100644 index 00000000000..953a20d4335 --- /dev/null +++ b/2021/34xxx/CVE-2021-34810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-34810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34811.json b/2021/34xxx/CVE-2021-34811.json new file mode 100644 index 00000000000..567b459738f --- /dev/null +++ b/2021/34xxx/CVE-2021-34811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-34811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34812.json b/2021/34xxx/CVE-2021-34812.json new file mode 100644 index 00000000000..e233e2bd5d6 --- /dev/null +++ b/2021/34xxx/CVE-2021-34812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-34812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file