From 3bc68d43958869f383c6e19b1ea318f934da86f7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 29 Mar 2021 17:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/15xxx/CVE-2017-15950.json | 5 +++ 2020/25xxx/CVE-2020-25217.json | 56 ++++++++++++++++++++++++++++++---- 2020/25xxx/CVE-2020-25218.json | 56 ++++++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27216.json | 5 +++ 2021/21xxx/CVE-2021-21290.json | 5 +++ 2021/21xxx/CVE-2021-21295.json | 5 +++ 2021/3xxx/CVE-2021-3111.json | 5 +++ 7 files changed, 125 insertions(+), 12 deletions(-) diff --git a/2017/15xxx/CVE-2017-15950.json b/2017/15xxx/CVE-2017-15950.json index 6d21fd6c5fe..d542aded78e 100644 --- a/2017/15xxx/CVE-2017-15950.json +++ b/2017/15xxx/CVE-2017-15950.json @@ -56,6 +56,11 @@ "name": "http://seclists.org/fulldisclosure/2017/Oct/64", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Oct/64" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html" } ] } diff --git a/2020/25xxx/CVE-2020-25217.json b/2020/25xxx/CVE-2020-25217.json index ffec157839b..d4c7a9a2243 100644 --- a/2020/25xxx/CVE-2020-25217.json +++ b/2020/25xxx/CVE-2020-25217.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25217", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25217", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allows Command Injection as root in its administrative web interface." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0001/FEYE-2021-0001.md", + "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0001/FEYE-2021-0001.md" } ] } diff --git a/2020/25xxx/CVE-2020-25218.json b/2020/25xxx/CVE-2020-25218.json index 786fcd3446e..3d1856d73fd 100644 --- a/2020/25xxx/CVE-2020-25218.json +++ b/2020/25xxx/CVE-2020-25218.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25218", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25218", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allow Authentication Bypass in its administrative web interface." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0002/FEYE-2021-0002.md", + "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0002/FEYE-2021-0002.md" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 332bc84cf7a..f2a25afba16 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -555,6 +555,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210327 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210329 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 52a60e9d7d0..49c31f9dc3c 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -181,6 +181,11 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290", "url": "https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final", + "url": "https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index 32cf254e845..a977b595779 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -118,6 +118,11 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290", "url": "https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final", + "url": "https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E" } ] }, diff --git a/2021/3xxx/CVE-2021-3111.json b/2021/3xxx/CVE-2021-3111.json index 64e34254688..5bf9c114a75 100644 --- a/2021/3xxx/CVE-2021-3111.json +++ b/2021/3xxx/CVE-2021-3111.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes", "url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html" } ] }