From 507241bc6489664cbbb1ab3003ae38c5446fb712 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 26 May 2021 22:00:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2008/3xxx/CVE-2008-3523.json | 14 ++++---- 2008/5xxx/CVE-2008-5084.json | 14 ++++---- 2008/5xxx/CVE-2008-5085.json | 14 ++++---- 2008/5xxx/CVE-2008-5509.json | 14 ++++---- 2009/3xxx/CVE-2009-3721.json | 63 ++++++++++++++++++++++++++++---- 2020/10xxx/CVE-2020-10695.json | 50 ++++++++++++++++++++++++-- 2020/27xxx/CVE-2020-27839.json | 50 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20196.json | 55 ++++++++++++++++++++++++++-- 2021/30xxx/CVE-2021-30469.json | 50 ++++++++++++++++++++++++-- 2021/30xxx/CVE-2021-30470.json | 50 ++++++++++++++++++++++++-- 2021/30xxx/CVE-2021-30471.json | 50 ++++++++++++++++++++++++-- 2021/30xxx/CVE-2021-30472.json | 50 ++++++++++++++++++++++++-- 2021/30xxx/CVE-2021-30498.json | 55 ++++++++++++++++++++++++++-- 2021/32xxx/CVE-2021-32614.json | 50 ++++++++++++++++++++++++-- 2021/3xxx/CVE-2021-3486.json | 60 +++++++++++++++++++++++++++++-- 2021/3xxx/CVE-2021-3527.json | 65 ++++++++++++++++++++++++++++++++-- 2021/3xxx/CVE-2021-3561.json | 60 +++++++++++++++++++++++++++++-- 17 files changed, 693 insertions(+), 71 deletions(-) diff --git a/2008/3xxx/CVE-2008-3523.json b/2008/3xxx/CVE-2008-3523.json index cdda0104d16..77311084de1 100644 --- a/2008/3xxx/CVE-2008-3523.json +++ b/2008/3xxx/CVE-2008-3523.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2008-3523", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2008-3523", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA." } ] } diff --git a/2008/5xxx/CVE-2008-5084.json b/2008/5xxx/CVE-2008-5084.json index 138537ad46a..6e11a882b25 100644 --- a/2008/5xxx/CVE-2008-5084.json +++ b/2008/5xxx/CVE-2008-5084.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2008-5084", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2008-5084", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA." } ] } diff --git a/2008/5xxx/CVE-2008-5085.json b/2008/5xxx/CVE-2008-5085.json index 988cd99f35f..3ef97a0c620 100644 --- a/2008/5xxx/CVE-2008-5085.json +++ b/2008/5xxx/CVE-2008-5085.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2008-5085", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2008-5085", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA." } ] } diff --git a/2008/5xxx/CVE-2008-5509.json b/2008/5xxx/CVE-2008-5509.json index a08c5ed1782..4b8484ef7af 100644 --- a/2008/5xxx/CVE-2008-5509.json +++ b/2008/5xxx/CVE-2008-5509.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2008-5509", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2008-5509", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs:CVE-2008-5508. Reason: This candidate is a duplicate of CVE-2008-5508. Notes: All CVE users should reference CVE-2008-5508 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2009/3xxx/CVE-2009-3721.json b/2009/3xxx/CVE-2009-3721.json index 7ececce31bc..52a70408fd7 100644 --- a/2009/3xxx/CVE-2009-3721.json +++ b/2009/3xxx/CVE-2009-3721.json @@ -1,17 +1,66 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2009-3721", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2009-3721", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ytnef", + "version": { + "version_data": [ + { + "version_value": "ytnef 2.8" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=521662", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521662" + }, + { + "refsource": "MISC", + "name": "http://www.ocert.org/advisories/ocert-2009-013.html", + "url": "http://www.ocert.org/advisories/ocert-2009-013.html" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments." } ] } diff --git a/2020/10xxx/CVE-2020-10695.json b/2020/10xxx/CVE-2020-10695.json index 596ea76f261..cfcc1bb9fe0 100644 --- a/2020/10xxx/CVE-2020-10695.json +++ b/2020/10xxx/CVE-2020-10695.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-10695", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "containers/redhat-sso-7", + "version": { + "version_data": [ + { + "version_value": "redhat-sso 7.4.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-266" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1817530", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817530" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An insecure modification flaw in the /etc/passwd file was found in the redhat-sso-7 container. An attacker with access to the container can use this flaw to modify the /etc/passwd and escalate their privileges." } ] } diff --git a/2020/27xxx/CVE-2020-27839.json b/2020/27xxx/CVE-2020-27839.json index 0f1bec9bc1b..07cabd923f4 100644 --- a/2020/27xxx/CVE-2020-27839.json +++ b/2020/27xxx/CVE-2020-27839.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27839", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ceph-dashboard", + "version": { + "version_data": [ + { + "version_value": "ceph-dashboard 14.2.17, ceph-dashboard 15.2.9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-522" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1901330", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901330" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for user authentication is stored by the frontend application in the browser\u2019s localStorage which is potentially vulnerable to attackers via XSS attacks. The highest threat from this vulnerability is to data confidentiality and integrity." } ] } diff --git a/2021/20xxx/CVE-2021-20196.json b/2021/20xxx/CVE-2021-20196.json index b19d93038d0..ec51d2777a7 100644 --- a/2021/20xxx/CVE-2021-20196.json +++ b/2021/20xxx/CVE-2021-20196.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20196", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "qemu", + "version": { + "version_data": [ + { + "version_value": "vulnerable up to (including) qemu 5.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugs.launchpad.net/qemu/+bug/1912780", + "url": "https://bugs.launchpad.net/qemu/+bug/1912780" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/01/28/1", + "url": "https://www.openwall.com/lists/oss-security/2021/01/28/1" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/30xxx/CVE-2021-30469.json b/2021/30xxx/CVE-2021-30469.json index 6a2f8885219..5a01c9268dc 100644 --- a/2021/30xxx/CVE-2021-30469.json +++ b/2021/30xxx/CVE-2021-30469.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-30469", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "patrick@puiterwijk.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "podofo", + "version": { + "version_data": [ + { + "version_value": "PoDoFo 0.9.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1947433", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947433" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in PoDoFo 0.9.7. An use-after-free in PoDoFo::PdfVecObjects::Clear() function can cause a denial of service via a crafted PDF file." } ] } diff --git a/2021/30xxx/CVE-2021-30470.json b/2021/30xxx/CVE-2021-30470.json index 3a87da3e068..8d08a7044f0 100644 --- a/2021/30xxx/CVE-2021-30470.json +++ b/2021/30xxx/CVE-2021-30470.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-30470", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "patrick@puiterwijk.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "podofo", + "version": { + "version_data": [ + { + "version_value": "PoDoFo 0.9.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-674" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1947436", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947436" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in PoDoFo 0.9.7. An uncontrolled recursive call among PdfTokenizer::ReadArray(), PdfTokenizer::GetNextVariant() and PdfTokenizer::ReadDataType() functions can lead to a stack overflow." } ] } diff --git a/2021/30xxx/CVE-2021-30471.json b/2021/30xxx/CVE-2021-30471.json index d58643c69f6..4c30f525093 100644 --- a/2021/30xxx/CVE-2021-30471.json +++ b/2021/30xxx/CVE-2021-30471.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-30471", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "patrick@puiterwijk.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "podofo", + "version": { + "version_data": [ + { + "version_value": "PoDoFo 0.9.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-674" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1947441", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947441" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in PoDoFo 0.9.7. An uncontrolled recursive call in PdfNamesTree::AddToDictionary function in src/podofo/doc/PdfNamesTree.cpp can lead to a stack overflow." } ] } diff --git a/2021/30xxx/CVE-2021-30472.json b/2021/30xxx/CVE-2021-30472.json index e87ca10a430..bad8d28e1f4 100644 --- a/2021/30xxx/CVE-2021-30472.json +++ b/2021/30xxx/CVE-2021-30472.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-30472", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "patrick@puiterwijk.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "podofo", + "version": { + "version_data": [ + { + "version_value": "PoDoFo 0.9.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1947458", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947458" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in PoDoFo 0.9.7. A stack-based buffer overflow in PdfEncryptMD5Base::ComputeOwnerKey function in PdfEncrypt.cpp is possible because of a improper check of the keyLength value." } ] } diff --git a/2021/30xxx/CVE-2021-30498.json b/2021/30xxx/CVE-2021-30498.json index c57a3562995..d9c1d392fcc 100644 --- a/2021/30xxx/CVE-2021-30498.json +++ b/2021/30xxx/CVE-2021-30498.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-30498", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "libcaca", + "version": { + "version_data": [ + { + "version_value": "master" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/cacalabs/libcaca/issues/53", + "url": "https://github.com/cacalabs/libcaca/issues/53" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1948675", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948675" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in libcaca. A heap buffer overflow in export.c in function export_tga might lead to memory corruption and other potential consequences." } ] } diff --git a/2021/32xxx/CVE-2021-32614.json b/2021/32xxx/CVE-2021-32614.json index 62f94a4de6d..aa31f371c1e 100644 --- a/2021/32xxx/CVE-2021-32614.json +++ b/2021/32xxx/CVE-2021-32614.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32614", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "patrick@puiterwijk.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "dmg2img", + "version": { + "version_data": [ + { + "version_value": "dmg2img through 20170502" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1959911", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959911" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in dmg2img through 20170502. fill_mishblk() does not check the length of the read buffer, and copy 0xCC bytes from it. The length of the buffer is controlled by an attacker. By providing a length smaller than 0xCC, memcpy reaches out of the malloc'ed bound. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution." } ] } diff --git a/2021/3xxx/CVE-2021-3486.json b/2021/3xxx/CVE-2021-3486.json index 7b6daf6bc30..e0b8d11a741 100644 --- a/2021/3xxx/CVE-2021-3486.json +++ b/2021/3xxx/CVE-2021-3486.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3486", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "patrick@puiterwijk.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "glpi 9.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1947653", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947653" + }, + { + "refsource": "MISC", + "name": "https://n3k00n3.github.io/blog/09042021/glpi_xss.html", + "url": "https://n3k00n3.github.io/blog/09042021/glpi_xss.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS", + "url": "https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPi 9.5.4 does not sanitize the metadata. This way its possible to insert XSS into plugins to execute JavaScript code." } ] } diff --git a/2021/3xxx/CVE-2021-3527.json b/2021/3xxx/CVE-2021-3527.json index 2ff5a713ba1..c8fae0fb166 100644 --- a/2021/3xxx/CVE-2021-3527.json +++ b/2021/3xxx/CVE-2021-3527.json @@ -4,14 +4,73 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3527", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "QEMU", + "version": { + "version_data": [ + { + "version_value": "all versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1955695", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955695" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/05/05/5", + "url": "https://www.openwall.com/lists/oss-security/2021/05/05/5" + }, + { + "refsource": "MISC", + "name": "https://gitlab.com/qemu-project/qemu/-/commit/7ec54f9eb62b5d177e30eb8b1cad795a5f8d8986", + "url": "https://gitlab.com/qemu-project/qemu/-/commit/7ec54f9eb62b5d177e30eb8b1cad795a5f8d8986" + }, + { + "refsource": "MISC", + "name": "https://gitlab.com/qemu-project/qemu/-/commit/05a40b172e4d691371534828078be47e7fff524c", + "url": "https://gitlab.com/qemu-project/qemu/-/commit/05a40b172e4d691371534828078be47e7fff524c" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service." } ] } diff --git a/2021/3xxx/CVE-2021-3561.json b/2021/3xxx/CVE-2021-3561.json index acc7fb23de1..b2596e3afb8 100644 --- a/2021/3xxx/CVE-2021-3561.json +++ b/2021/3xxx/CVE-2021-3561.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3561", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "fig2dev", + "version": { + "version_data": [ + { + "version_value": "fig2dev 3.2.8a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://sourceforge.net/p/mcj/tickets/116/", + "url": "https://sourceforge.net/p/mcj/tickets/116/" + }, + { + "refsource": "MISC", + "name": "https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/", + "url": "https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1955675", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955675" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability." } ] }