"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-04-26 17:02:45 +00:00
parent 105633ea79
commit 38f2b4fbda
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
39 changed files with 921 additions and 735 deletions

View File

@ -645,6 +645,11 @@
"refsource": "MLIST",
"name": "[beam-issues] 20210423 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
"url": "https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[beam-issues] 20210426 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
"url": "https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E"
}
]
}

View File

@ -1,90 +1,90 @@
{
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 6446699 (Planning Analytics)",
"name" : "https://www.ibm.com/support/pages/node/6446699",
"url" : "https://www.ibm.com/support/pages/node/6446699",
"refsource" : "CONFIRM"
},
{
"title" : "X-Force Vulnerability Report",
"name" : "ibm-planning-cve20204562-info-disc (183904)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/183904",
"refsource" : "XF"
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"UI" : "N",
"SCORE" : "5.300",
"I" : "N",
"S" : "U",
"A" : "N",
"AV" : "N",
"AC" : "L",
"C" : "L",
"PR" : "N"
},
"TM" : {
"E" : "U",
"RL" : "O",
"RC" : "C"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information by allowing cross-window communication with unrestricted target origin via documentation frames.",
"lang" : "eng"
}
]
},
"data_type" : "CVE",
"affects" : {
"vendor" : {
"vendor_data" : [
"problemtype": {
"problemtype_data": [
{
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "2.0"
}
]
},
"product_name" : "Planning Analytics"
}
]
},
"vendor_name" : "IBM"
"description": [
{
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
}
},
"data_format" : "MITRE",
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2021-04-23T00:00:00",
"STATE" : "PUBLIC",
"ID" : "CVE-2020-4562"
}
}
]
},
"references": {
"reference_data": [
{
"title": "IBM Security Bulletin 6446699 (Planning Analytics)",
"name": "https://www.ibm.com/support/pages/node/6446699",
"url": "https://www.ibm.com/support/pages/node/6446699",
"refsource": "CONFIRM"
},
{
"title": "X-Force Vulnerability Report",
"name": "ibm-planning-cve20204562-info-disc (183904)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183904",
"refsource": "XF"
}
]
},
"impact": {
"cvssv3": {
"BM": {
"UI": "N",
"SCORE": "5.300",
"I": "N",
"S": "U",
"A": "N",
"AV": "N",
"AC": "L",
"C": "L",
"PR": "N"
},
"TM": {
"E": "U",
"RL": "O",
"RC": "C"
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"value": "IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information by allowing cross-window communication with unrestricted target origin via documentation frames.",
"lang": "eng"
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "2.0"
}
]
},
"product_name": "Planning Analytics"
}
]
},
"vendor_name": "IBM"
}
]
}
},
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2021-04-23T00:00:00",
"STATE": "PUBLIC",
"ID": "CVE-2020-4562"
}
}

View File

@ -83,6 +83,11 @@
"refsource": "MLIST",
"name": "[spark-issues] 20210425 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch",
"url": "https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[spark-issues] 20210426 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch",
"url": "https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E"
}
]
},

View File

@ -83,6 +83,11 @@
"refsource": "MLIST",
"name": "[spark-issues] 20210425 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch",
"url": "https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[spark-issues] 20210426 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch",
"url": "https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E"
}
]
},

View File

@ -1,93 +1,93 @@
{
"impact" : {
"cvssv3" : {
"TM" : {
"RC" : "C",
"RL" : "O",
"E" : "U"
},
"BM" : {
"AV" : "N",
"UI" : "N",
"SCORE" : "6.500",
"I" : "L",
"S" : "U",
"A" : "N",
"C" : "L",
"PR" : "N",
"AC" : "L"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://www.ibm.com/support/pages/node/6445733",
"title" : "IBM Security Bulletin 6445733 (Spectrum Protect Plus)",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/pages/node/6445733"
},
{
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196344",
"name" : "ibm-spectrum-cve202120432-info-disc (196344)",
"title" : "X-Force Vulnerability Report"
}
]
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Spectrum Protect Plus 10.1.0 through 10.1.7 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 196344."
}
]
},
"data_version" : "4.0",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "Spectrum Protect Plus",
"version" : {
"version_data" : [
{
"version_value" : "10.1.0"
},
{
"version_value" : "10.1.7"
}
]
}
}
]
}
"impact": {
"cvssv3": {
"TM": {
"RC": "C",
"RL": "O",
"E": "U"
},
"BM": {
"AV": "N",
"UI": "N",
"SCORE": "6.500",
"I": "L",
"S": "U",
"A": "N",
"C": "L",
"PR": "N",
"AC": "L"
}
]
}
},
"data_type" : "CVE",
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"ID" : "CVE-2021-20432",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2021-04-23T00:00:00"
},
"data_format" : "MITRE"
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Obtain Information",
"lang": "eng"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ibm.com/support/pages/node/6445733",
"title": "IBM Security Bulletin 6445733 (Spectrum Protect Plus)",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/pages/node/6445733"
},
{
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196344",
"name": "ibm-spectrum-cve202120432-info-disc (196344)",
"title": "X-Force Vulnerability Report"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Spectrum Protect Plus 10.1.0 through 10.1.7 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 196344."
}
]
},
"data_version": "4.0",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Spectrum Protect Plus",
"version": {
"version_data": [
{
"version_value": "10.1.0"
},
{
"version_value": "10.1.7"
}
]
}
}
]
}
}
]
}
},
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2021-20432",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2021-04-23T00:00:00"
},
"data_format": "MITRE"
}

View File

@ -1,93 +1,93 @@
{
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 could allow a local user to escalate their privileges to take full control of the system due to insecure directory permissions. IBM X-Force ID: 198811.",
"lang" : "eng"
}
]
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/pages/node/6445503",
"title" : "IBM Security Bulletin 6445503 (Spectrum Protect for Virtual Environments)",
"name" : "https://www.ibm.com/support/pages/node/6445503"
},
{
"name" : "ibm-spectrum-cve202120532-priv-escalation (198811)",
"title" : "X-Force Vulnerability Report",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198811"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Gain Privileges",
"lang" : "eng"
}
]
}
]
},
"impact" : {
"cvssv3" : {
"TM" : {
"E" : "U",
"RL" : "O",
"RC" : "C"
},
"BM" : {
"AC" : "H",
"PR" : "N",
"C" : "H",
"SCORE" : "7.400",
"UI" : "N",
"I" : "H",
"S" : "U",
"A" : "H",
"AV" : "L"
}
}
},
"data_format" : "MITRE",
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"ID" : "CVE-2021-20532",
"DATE_PUBLIC" : "2021-04-24T00:00:00",
"STATE" : "PUBLIC"
},
"data_type" : "CVE",
"affects" : {
"vendor" : {
"vendor_data" : [
"data_version": "4.0",
"description": {
"description_data": [
{
"product" : {
"product_data" : [
{
"product_name" : "Spectrum Protect for Virtual Environments",
"version" : {
"version_data" : [
{
"version_value" : "8.1.0.0"
},
{
"version_value" : "8.1.11.0"
}
]
}
}
]
},
"vendor_name" : "IBM"
"value": "IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 could allow a local user to escalate their privileges to take full control of the system due to insecure directory permissions. IBM X-Force ID: 198811.",
"lang": "eng"
}
]
}
}
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/pages/node/6445503",
"title": "IBM Security Bulletin 6445503 (Spectrum Protect for Virtual Environments)",
"name": "https://www.ibm.com/support/pages/node/6445503"
},
{
"name": "ibm-spectrum-cve202120532-priv-escalation (198811)",
"title": "X-Force Vulnerability Report",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198811"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Gain Privileges",
"lang": "eng"
}
]
}
]
},
"impact": {
"cvssv3": {
"TM": {
"E": "U",
"RL": "O",
"RC": "C"
},
"BM": {
"AC": "H",
"PR": "N",
"C": "H",
"SCORE": "7.400",
"UI": "N",
"I": "H",
"S": "U",
"A": "H",
"AV": "L"
}
}
},
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2021-20532",
"DATE_PUBLIC": "2021-04-24T00:00:00",
"STATE": "PUBLIC"
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Spectrum Protect for Virtual Environments",
"version": {
"version_data": [
{
"version_value": "8.1.0.0"
},
{
"version_value": "8.1.11.0"
}
]
}
}
]
},
"vendor_name": "IBM"
}
]
}
}
}

View File

@ -1,93 +1,93 @@
{
"data_type" : "CVE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "10.1.6"
},
{
"version_value" : "10.1.7"
}
]
},
"product_name" : "Spectrum Protect Plus"
}
]
},
"vendor_name" : "IBM"
}
]
}
},
"CVE_data_meta" : {
"ID" : "CVE-2021-20536",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2021-04-24T00:00:00",
"ASSIGNER" : "psirt@us.ibm.com"
},
"data_format" : "MITRE",
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "10.1.6"
},
{
"version_value": "10.1.7"
}
]
},
"product_name": "Spectrum Protect Plus"
}
]
},
"vendor_name": "IBM"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 6445739 (Spectrum Protect Plus)",
"name" : "https://www.ibm.com/support/pages/node/6445739",
"url" : "https://www.ibm.com/support/pages/node/6445739",
"refsource" : "CONFIRM"
},
{
"title" : "X-Force Vulnerability Report",
"name" : "ibm-spectrum-cve202120536-info-disc (198836)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198836",
"refsource" : "XF"
}
]
},
"impact" : {
"cvssv3" : {
"TM" : {
"E" : "U",
"RL" : "O",
"RC" : "C"
},
"BM" : {
"SCORE" : "6.200",
"I" : "N",
"UI" : "N",
"A" : "N",
"S" : "U",
"AV" : "L",
"AC" : "L",
"C" : "H",
"PR" : "N"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Spectrum Protect Plus File Systems Agent 10.1.6 and 10.1.7 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 198836."
}
]
}
}
}
},
"CVE_data_meta": {
"ID": "CVE-2021-20536",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2021-04-24T00:00:00",
"ASSIGNER": "psirt@us.ibm.com"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
},
"references": {
"reference_data": [
{
"title": "IBM Security Bulletin 6445739 (Spectrum Protect Plus)",
"name": "https://www.ibm.com/support/pages/node/6445739",
"url": "https://www.ibm.com/support/pages/node/6445739",
"refsource": "CONFIRM"
},
{
"title": "X-Force Vulnerability Report",
"name": "ibm-spectrum-cve202120536-info-disc (198836)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198836",
"refsource": "XF"
}
]
},
"impact": {
"cvssv3": {
"TM": {
"E": "U",
"RL": "O",
"RC": "C"
},
"BM": {
"SCORE": "6.200",
"I": "N",
"UI": "N",
"A": "N",
"S": "U",
"AV": "L",
"AC": "L",
"C": "H",
"PR": "N"
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Spectrum Protect Plus File Systems Agent 10.1.6 and 10.1.7 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 198836."
}
]
}
}

View File

@ -1,93 +1,93 @@
{
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and cause the application to crash. IBM X-Force ID: 198934"
}
]
},
"data_version" : "4.0",
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "H",
"S" : "U",
"I" : "N",
"SCORE" : "6.200",
"UI" : "N",
"AV" : "L",
"AC" : "L",
"C" : "N",
"PR" : "N"
},
"TM" : {
"RL" : "O",
"RC" : "C",
"E" : "U"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Denial of Service",
"lang" : "eng"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://www.ibm.com/support/pages/node/6445497",
"title" : "IBM Security Bulletin 6445497 (Spectrum Protect for Space Management)",
"url" : "https://www.ibm.com/support/pages/node/6445497",
"refsource" : "CONFIRM"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198934",
"refsource" : "XF",
"name" : "ibm-spectrum-cve202120546-bo (198934)",
"title" : "X-Force Vulnerability Report"
}
]
},
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"ID" : "CVE-2021-20546",
"DATE_PUBLIC" : "2021-04-23T00:00:00",
"STATE" : "PUBLIC"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"affects" : {
"vendor" : {
"vendor_data" : [
"description": {
"description_data": [
{
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "8.1.0.0"
},
{
"version_value" : "8.1.11.0"
}
]
},
"product_name" : "Spectrum Protect for Space Management"
}
]
},
"vendor_name" : "IBM"
"lang": "eng",
"value": "IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and cause the application to crash. IBM X-Force ID: 198934"
}
]
}
}
}
]
},
"data_version": "4.0",
"impact": {
"cvssv3": {
"BM": {
"A": "H",
"S": "U",
"I": "N",
"SCORE": "6.200",
"UI": "N",
"AV": "L",
"AC": "L",
"C": "N",
"PR": "N"
},
"TM": {
"RL": "O",
"RC": "C",
"E": "U"
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Denial of Service",
"lang": "eng"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ibm.com/support/pages/node/6445497",
"title": "IBM Security Bulletin 6445497 (Spectrum Protect for Space Management)",
"url": "https://www.ibm.com/support/pages/node/6445497",
"refsource": "CONFIRM"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198934",
"refsource": "XF",
"name": "ibm-spectrum-cve202120546-bo (198934)",
"title": "X-Force Vulnerability Report"
}
]
},
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2021-20546",
"DATE_PUBLIC": "2021-04-23T00:00:00",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "8.1.0.0"
},
{
"version_value": "8.1.11.0"
}
]
},
"product_name": "Spectrum Protect for Space Management"
}
]
},
"vendor_name": "IBM"
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21201",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1025683"
"url": "https://crbug.com/1025683",
"refsource": "MISC",
"name": "https://crbug.com/1025683"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21202",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1188889"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1188889",
"refsource": "MISC",
"name": "https://crbug.com/1188889"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21203",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1192054"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1192054",
"refsource": "MISC",
"name": "https://crbug.com/1192054"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21204",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1189926"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1189926",
"refsource": "MISC",
"name": "https://crbug.com/1189926"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21205",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1165654"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1165654",
"refsource": "MISC",
"name": "https://crbug.com/1165654"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21206",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1196781"
"url": "https://crbug.com/1196781",
"refsource": "MISC",
"name": "https://crbug.com/1196781"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21207",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1185732"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1185732",
"refsource": "MISC",
"name": "https://crbug.com/1185732"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21208",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1039539"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1039539",
"refsource": "MISC",
"name": "https://crbug.com/1039539"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21209",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1143526"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1143526",
"refsource": "MISC",
"name": "https://crbug.com/1143526"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21210",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1184562"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1184562",
"refsource": "MISC",
"name": "https://crbug.com/1184562"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21211",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1103119"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1103119",
"refsource": "MISC",
"name": "https://crbug.com/1103119"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21212",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1145024"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1145024",
"refsource": "MISC",
"name": "https://crbug.com/1145024"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21213",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1161806"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1161806",
"refsource": "MISC",
"name": "https://crbug.com/1161806"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21214",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1170148"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1170148",
"refsource": "MISC",
"name": "https://crbug.com/1170148"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21215",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1172533"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1172533",
"refsource": "MISC",
"name": "https://crbug.com/1172533"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21216",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1173297"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1173297",
"refsource": "MISC",
"name": "https://crbug.com/1173297"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21217",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1166462"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1166462",
"refsource": "MISC",
"name": "https://crbug.com/1166462"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21218",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1166478"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1166478",
"refsource": "MISC",
"name": "https://crbug.com/1166478"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21219",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1166972"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1166972",
"refsource": "MISC",
"name": "https://crbug.com/1166972"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21220",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1196683"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1196683",
"refsource": "MISC",
"name": "https://crbug.com/1196683"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21221",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1195333"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html"
"url": "https://crbug.com/1195333",
"refsource": "MISC",
"name": "https://crbug.com/1195333"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21222",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1194046"
"url": "https://crbug.com/1194046",
"refsource": "MISC",
"name": "https://crbug.com/1194046"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21223",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1195308"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
"url": "https://crbug.com/1195308",
"refsource": "MISC",
"name": "https://crbug.com/1195308"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21224",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1195777"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
"url": "https://crbug.com/1195777",
"refsource": "MISC",
"name": "https://crbug.com/1195777"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21225",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1195977"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
"url": "https://crbug.com/1195977",
"refsource": "MISC",
"name": "https://crbug.com/1195977"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-21226",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1197904"
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html"
"url": "https://crbug.com/1197904",
"refsource": "MISC",
"name": "https://crbug.com/1197904"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/seopanel/Seo-Panel/issues/209",
"refsource": "MISC",
"name": "https://github.com/seopanel/Seo-Panel/issues/209"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html",
"url": "http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html"
}
]
}

View File

@ -1,93 +1,93 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"ID" : "CVE-2021-29672",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2021-04-23T00:00:00"
},
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "Spectrum Protect for Space Management",
"version" : {
"version_data" : [
{
"version_value" : "8.1.0.0"
},
{
"version_value" : "8.1.11.0"
}
]
}
}
]
}
}
]
}
},
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM Spectrum Protect Client 8.1.0.0-8 through 1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing the current locale settings. A local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash. IBM X-Force ID: 199479",
"lang" : "eng"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Gain Privileges",
"lang" : "eng"
}
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2021-29672",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2021-04-23T00:00:00"
},
"data_format": "MITRE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Spectrum Protect for Space Management",
"version": {
"version_data": [
{
"version_value": "8.1.0.0"
},
{
"version_value": "8.1.11.0"
}
]
}
}
]
}
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.ibm.com/support/pages/node/6445497",
"refsource" : "CONFIRM",
"title" : "IBM Security Bulletin 6445497 (Spectrum Protect for Space Management)",
"name" : "https://www.ibm.com/support/pages/node/6445497"
},
{
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/199479",
"title" : "X-Force Vulnerability Report",
"name" : "ibm-spectrum-cve202129672-bo (199479)"
}
]
},
"impact" : {
"cvssv3" : {
"TM" : {
"E" : "U",
"RL" : "O",
"RC" : "C"
},
"BM" : {
"AC" : "L",
"C" : "H",
"PR" : "N",
"AV" : "L",
"UI" : "N",
"SCORE" : "8.400",
"I" : "H",
"S" : "U",
"A" : "H"
}
}
}
}
}
},
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"value": "IBM Spectrum Protect Client 8.1.0.0-8 through 1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing the current locale settings. A local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash. IBM X-Force ID: 199479",
"lang": "eng"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Gain Privileges",
"lang": "eng"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.ibm.com/support/pages/node/6445497",
"refsource": "CONFIRM",
"title": "IBM Security Bulletin 6445497 (Spectrum Protect for Space Management)",
"name": "https://www.ibm.com/support/pages/node/6445497"
},
{
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199479",
"title": "X-Force Vulnerability Report",
"name": "ibm-spectrum-cve202129672-bo (199479)"
}
]
},
"impact": {
"cvssv3": {
"TM": {
"E": "U",
"RL": "O",
"RC": "C"
},
"BM": {
"AC": "L",
"C": "H",
"PR": "N",
"AV": "L",
"UI": "N",
"SCORE": "8.400",
"I": "H",
"S": "U",
"A": "H"
}
}
}
}

View File

@ -1,93 +1,93 @@
{
"data_type" : "CVE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "10.1.0"
},
{
"version_value" : "10.1.7"
}
]
},
"product_name" : "Spectrum Protect Plus"
}
]
}
}
]
}
},
"data_format" : "MITRE",
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2021-04-24T00:00:00",
"ID" : "CVE-2021-29694"
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"S" : "U",
"I" : "N",
"SCORE" : "5.900",
"UI" : "N",
"AV" : "N",
"C" : "H",
"PR" : "N",
"AC" : "H"
},
"TM" : {
"E" : "U",
"RL" : "O",
"RC" : "C"
}
}
},
"references" : {
"reference_data" : [
{
"url" : "https://www.ibm.com/support/pages/node/6445735",
"refsource" : "CONFIRM",
"title" : "IBM Security Bulletin 6445735 (Spectrum Protect Plus)",
"name" : "https://www.ibm.com/support/pages/node/6445735"
},
{
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/200258",
"name" : "ibm-spectrum-cve202129694-info-disc (200258)",
"title" : "X-Force Vulnerability Report"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "10.1.0"
},
{
"version_value": "10.1.7"
}
]
},
"product_name": "Spectrum Protect Plus"
}
]
}
}
]
}
]
},
"description" : {
"description_data" : [
{
"value" : "IBM Spectrum Protect Plus \t10.1.0 through 10.1.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 200258.",
"lang" : "eng"
}
]
},
"data_version" : "4.0"
}
}
},
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2021-04-24T00:00:00",
"ID": "CVE-2021-29694"
},
"impact": {
"cvssv3": {
"BM": {
"A": "N",
"S": "U",
"I": "N",
"SCORE": "5.900",
"UI": "N",
"AV": "N",
"C": "H",
"PR": "N",
"AC": "H"
},
"TM": {
"E": "U",
"RL": "O",
"RC": "C"
}
}
},
"references": {
"reference_data": [
{
"url": "https://www.ibm.com/support/pages/node/6445735",
"refsource": "CONFIRM",
"title": "IBM Security Bulletin 6445735 (Spectrum Protect Plus)",
"name": "https://www.ibm.com/support/pages/node/6445735"
},
{
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/200258",
"name": "ibm-spectrum-cve202129694-info-disc (200258)",
"title": "X-Force Vulnerability Report"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
},
"description": {
"description_data": [
{
"value": "IBM Spectrum Protect Plus 10.1.0 through 10.1.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 200258.",
"lang": "eng"
}
]
},
"data_version": "4.0"
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-31811",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-31812",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}