diff --git a/2020/20xxx/CVE-2020-20269.json b/2020/20xxx/CVE-2020-20269.json index 14bc9c4a00f..c619b3ead11 100644 --- a/2020/20xxx/CVE-2020-20269.json +++ b/2020/20xxx/CVE-2020-20269.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://seclists.org/fulldisclosure/2021/Jan/59", "url": "https://seclists.org/fulldisclosure/2021/Jan/59" + }, + { + "refsource": "FULLDISC", + "name": "20210122 CVE-2020-20269 - Caret Editor v4.0.0-rc21 Remote Code Execution", + "url": "http://seclists.org/fulldisclosure/2021/Jan/59" } ] } diff --git a/2020/25xxx/CVE-2020-25681.json b/2020/25xxx/CVE-2020-25681.json index a380035be40..da67f4f18e5 100644 --- a/2020/25xxx/CVE-2020-25681.json +++ b/2020/25xxx/CVE-2020-25681.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-84440e87ba", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-17", + "url": "https://security.gentoo.org/glsa/202101-17" } ] }, diff --git a/2020/25xxx/CVE-2020-25682.json b/2020/25xxx/CVE-2020-25682.json index 78ea17a1799..6ddc99103d7 100644 --- a/2020/25xxx/CVE-2020-25682.json +++ b/2020/25xxx/CVE-2020-25682.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-84440e87ba", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-17", + "url": "https://security.gentoo.org/glsa/202101-17" } ] }, diff --git a/2020/25xxx/CVE-2020-25684.json b/2020/25xxx/CVE-2020-25684.json index 58b575436b3..1474e0213b9 100644 --- a/2020/25xxx/CVE-2020-25684.json +++ b/2020/25xxx/CVE-2020-25684.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-84440e87ba", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-17", + "url": "https://security.gentoo.org/glsa/202101-17" } ] }, diff --git a/2020/25xxx/CVE-2020-25685.json b/2020/25xxx/CVE-2020-25685.json index 009204dcb44..daf7eb70059 100644 --- a/2020/25xxx/CVE-2020-25685.json +++ b/2020/25xxx/CVE-2020-25685.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-84440e87ba", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-17", + "url": "https://security.gentoo.org/glsa/202101-17" } ] }, diff --git a/2020/25xxx/CVE-2020-25686.json b/2020/25xxx/CVE-2020-25686.json index 5c9f92dcc26..a8e179ef1e8 100644 --- a/2020/25xxx/CVE-2020-25686.json +++ b/2020/25xxx/CVE-2020-25686.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-84440e87ba", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-17", + "url": "https://security.gentoo.org/glsa/202101-17" } ] }, diff --git a/2020/25xxx/CVE-2020-25687.json b/2020/25xxx/CVE-2020-25687.json index 4ddd87fd35d..0f832f2cb0b 100644 --- a/2020/25xxx/CVE-2020-25687.json +++ b/2020/25xxx/CVE-2020-25687.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-84440e87ba", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-17", + "url": "https://security.gentoo.org/glsa/202101-17" } ] }, diff --git a/2021/22xxx/CVE-2021-22871.json b/2021/22xxx/CVE-2021-22871.json index 49018fd7269..9b83043ae66 100644 --- a/2021/22xxx/CVE-2021-22871.json +++ b/2021/22xxx/CVE-2021-22871.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://github.com/revive-adserver/revive-adserver/commit/62a2a0439", "url": "https://github.com/revive-adserver/revive-adserver/commit/62a2a0439" + }, + { + "refsource": "FULLDISC", + "name": "20210122 [REVIVE-SA-2021-001] Revive Adserver Vulnerabilities", + "url": "http://seclists.org/fulldisclosure/2021/Jan/60" } ] }, diff --git a/2021/22xxx/CVE-2021-22872.json b/2021/22xxx/CVE-2021-22872.json index 21ab6ccbf23..db2c310379c 100644 --- a/2021/22xxx/CVE-2021-22872.json +++ b/2021/22xxx/CVE-2021-22872.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://github.com/revive-adserver/revive-adserver/commit/1dbcf7d50", "url": "https://github.com/revive-adserver/revive-adserver/commit/1dbcf7d50" + }, + { + "refsource": "FULLDISC", + "name": "20210122 [REVIVE-SA-2021-001] Revive Adserver Vulnerabilities", + "url": "http://seclists.org/fulldisclosure/2021/Jan/60" } ] }, diff --git a/2021/22xxx/CVE-2021-22873.json b/2021/22xxx/CVE-2021-22873.json index 0d2729983c3..d2f958d3c56 100644 --- a/2021/22xxx/CVE-2021-22873.json +++ b/2021/22xxx/CVE-2021-22873.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://github.com/revive-adserver/revive-adserver/issues/1068", "url": "https://github.com/revive-adserver/revive-adserver/issues/1068" + }, + { + "refsource": "FULLDISC", + "name": "20210122 [REVIVE-SA-2021-001] Revive Adserver Vulnerabilities", + "url": "http://seclists.org/fulldisclosure/2021/Jan/60" } ] }, diff --git a/2021/3xxx/CVE-2021-3271.json b/2021/3xxx/CVE-2021-3271.json index 6a78cf0ed46..5b2050a158d 100644 --- a/2021/3xxx/CVE-2021-3271.json +++ b/2021/3xxx/CVE-2021-3271.json @@ -1,66 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2021-3271", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, "description": { "description_data": [ { "lang": "eng", - "value": "PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://github.com/pressbooks/pressbooks/pull/2072", - "refsource": "MISC", - "name": "https://github.com/pressbooks/pressbooks/pull/2072" - }, - { - "url": "https://github.com/pressbooks/pressbooks", - "refsource": "MISC", - "name": "https://github.com/pressbooks/pressbooks" + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] }