From 3c136224a6e95efc61518b113f1c113a92e2ae04 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 2 Apr 2021 05:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/30xxx/CVE-2021-30000.json | 18 +++++++++ 2021/30xxx/CVE-2021-30001.json | 18 +++++++++ 2021/30xxx/CVE-2021-30002.json | 72 ++++++++++++++++++++++++++++++++++ 2021/30xxx/CVE-2021-30003.json | 62 +++++++++++++++++++++++++++++ 2021/30xxx/CVE-2021-30004.json | 62 +++++++++++++++++++++++++++++ 5 files changed, 232 insertions(+) create mode 100644 2021/30xxx/CVE-2021-30000.json create mode 100644 2021/30xxx/CVE-2021-30001.json create mode 100644 2021/30xxx/CVE-2021-30002.json create mode 100644 2021/30xxx/CVE-2021-30003.json create mode 100644 2021/30xxx/CVE-2021-30004.json diff --git a/2021/30xxx/CVE-2021-30000.json b/2021/30xxx/CVE-2021-30000.json new file mode 100644 index 00000000000..da63e1b0299 --- /dev/null +++ b/2021/30xxx/CVE-2021-30000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30001.json b/2021/30xxx/CVE-2021-30001.json new file mode 100644 index 00000000000..1821e8dc3f2 --- /dev/null +++ b/2021/30xxx/CVE-2021-30001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30002.json b/2021/30xxx/CVE-2021-30002.json new file mode 100644 index 00000000000..a3b9664a31e --- /dev/null +++ b/2021/30xxx/CVE-2021-30002.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-30002", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899" + }, + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1184120", + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1184120" + }, + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3" + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30003.json b/2021/30xxx/CVE-2021-30003.json new file mode 100644 index 00000000000..2939b1171cf --- /dev/null +++ b/2021/30xxx/CVE-2021-30003.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-30003", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on Nokia G-120W-F 3FE46606AGAB91 devices. There is Stored XSS in the administrative interface via urlfilter.cgi?add url_address." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.0xdutra.com/posts/router-g120w-f/", + "refsource": "MISC", + "name": "https://research.0xdutra.com/posts/router-g120w-f/" + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30004.json b/2021/30xxx/CVE-2021-30004.json new file mode 100644 index 00000000000..4e805fbe9cb --- /dev/null +++ b/2021/30xxx/CVE-2021-30004.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-30004", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15", + "refsource": "MISC", + "name": "https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15" + } + ] + } +} \ No newline at end of file