From 5e178de6edbd74fbcc619e9a58fbf241f30bb59d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 11 Oct 2021 19:01:01 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27372.json | 56 +++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25738.json | 12 +++--- 2021/40xxx/CVE-2021-40188.json | 56 +++++++++++++++++++++++++--- 2021/40xxx/CVE-2021-40189.json | 56 +++++++++++++++++++++++++--- 2021/40xxx/CVE-2021-40239.json | 56 +++++++++++++++++++++++++--- 2021/40xxx/CVE-2021-40617.json | 56 +++++++++++++++++++++++++--- 2021/42xxx/CVE-2021-42251.json | 18 +++++++++ 2021/42xxx/CVE-2021-42252.json | 67 ++++++++++++++++++++++++++++++++++ 2021/42xxx/CVE-2021-42253.json | 18 +++++++++ 9 files changed, 360 insertions(+), 35 deletions(-) create mode 100644 2021/42xxx/CVE-2021-42251.json create mode 100644 2021/42xxx/CVE-2021-42252.json create mode 100644 2021/42xxx/CVE-2021-42253.json diff --git a/2020/27xxx/CVE-2020-27372.json b/2020/27xxx/CVE-2020-27372.json index 06a4778b679..cc72d329622 100644 --- a/2020/27xxx/CVE-2020-27372.json +++ b/2020/27xxx/CVE-2020-27372.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27372", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27372", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability exists in Brandy Basic V Interpreter 1.21 in the run_interpreter function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sourceforge.net/p/brandy/bugs/10/", + "refsource": "MISC", + "name": "https://sourceforge.net/p/brandy/bugs/10/" } ] } diff --git a/2021/25xxx/CVE-2021-25738.json b/2021/25xxx/CVE-2021-25738.json index dfb3bdcf07b..1fb199515e0 100644 --- a/2021/25xxx/CVE-2021-25738.json +++ b/2021/25xxx/CVE-2021-25738.json @@ -93,12 +93,14 @@ "references": { "reference_data": [ { - "refsource": "MLIST", - "url": "https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk" + "refsource": "MISC", + "url": "https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk", + "name": "https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk" }, { - "refsource": "CONFIRM", - "url": "https://github.com/kubernetes-client/java/issues/1698" + "refsource": "MISC", + "url": "https://github.com/kubernetes-client/java/issues/1698", + "name": "https://github.com/kubernetes-client/java/issues/1698" } ] }, @@ -108,4 +110,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40188.json b/2021/40xxx/CVE-2021-40188.json index f5fd277f8b6..be25832ae15 100644 --- a/2021/40xxx/CVE-2021-40188.json +++ b/2021/40xxx/CVE-2021-40188.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40188", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40188", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PHPFusion 9.03.110 is affected by an arbitrary file upload vulnerability. The File Manager function in admin panel does not filter all PHP extensions such as \".php, .php7, .phtml, .php5, ...\". An attacker can upload a malicious file and execute code on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/PHPFusion/PHPFusion/issues/2372", + "refsource": "MISC", + "name": "https://github.com/PHPFusion/PHPFusion/issues/2372" } ] } diff --git a/2021/40xxx/CVE-2021-40189.json b/2021/40xxx/CVE-2021-40189.json index 270bb4d00a4..deb5387c9d0 100644 --- a/2021/40xxx/CVE-2021-40189.json +++ b/2021/40xxx/CVE-2021-40189.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40189", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40189", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PHPFusion 9.03.110 is affected by a remote code execution vulnerability. The theme function will extract a file to \"webroot/themes/{Theme Folder], where an attacker can access and execute arbitrary code." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/PHPFusion/PHPFusion/issues/2374", + "refsource": "MISC", + "name": "https://github.com/PHPFusion/PHPFusion/issues/2374" } ] } diff --git a/2021/40xxx/CVE-2021-40239.json b/2021/40xxx/CVE-2021-40239.json index 7c8c215c22a..0ddb2647f95 100644 --- a/2021/40xxx/CVE-2021-40239.json +++ b/2021/40xxx/CVE-2021-40239.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40239", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40239", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Buffer Overflow vulnerability exists in the latest version of Miniftpd in the do_retr function in ftpproto.c" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Gabe-commiter/Miniftpd/issues/2", + "refsource": "MISC", + "name": "https://github.com/Gabe-commiter/Miniftpd/issues/2" } ] } diff --git a/2021/40xxx/CVE-2021-40617.json b/2021/40xxx/CVE-2021-40617.json index 83970ca2e44..5b3859d5ee5 100644 --- a/2021/40xxx/CVE-2021-40617.json +++ b/2021/40xxx/CVE-2021-40617.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40617", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40617", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/OS4ED/openSIS-Classic/issues/192", + "refsource": "MISC", + "name": "https://github.com/OS4ED/openSIS-Classic/issues/192" } ] } diff --git a/2021/42xxx/CVE-2021-42251.json b/2021/42xxx/CVE-2021-42251.json new file mode 100644 index 00000000000..2c9e0ed5708 --- /dev/null +++ b/2021/42xxx/CVE-2021-42251.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42251", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42252.json b/2021/42xxx/CVE-2021-42252.json new file mode 100644 index 00000000000..ab3d0049f8c --- /dev/null +++ b/2021/42xxx/CVE-2021-42252.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42252", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96" + }, + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42253.json b/2021/42xxx/CVE-2021-42253.json new file mode 100644 index 00000000000..b3224392e7c --- /dev/null +++ b/2021/42xxx/CVE-2021-42253.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42253", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file