From 65146e6bfac9e8665261f290a2c9d51a0fb5c14b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 15 Dec 2021 08:01:01 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/19xxx/CVE-2019-19138.json | 61 +++++++++++++++++++++++++++---- 2020/23xxx/CVE-2020-23545.json | 66 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23151.json | 18 ++++++++++ 2021/44xxx/CVE-2021-44771.json | 18 ++++++++++ 2021/45xxx/CVE-2021-45043.json | 61 +++++++++++++++++++++++++++---- 2021/4xxx/CVE-2021-4121.json | 18 ++++++++++ 2021/4xxx/CVE-2021-4122.json | 18 ++++++++++ 7 files changed, 242 insertions(+), 18 deletions(-) create mode 100644 2021/23xxx/CVE-2021-23151.json create mode 100644 2021/44xxx/CVE-2021-44771.json create mode 100644 2021/4xxx/CVE-2021-4121.json create mode 100644 2021/4xxx/CVE-2021-4122.json diff --git a/2019/19xxx/CVE-2019-19138.json b/2019/19xxx/CVE-2019-19138.json index 64acb9a3d6b..1f779a7ca88 100644 --- a/2019/19xxx/CVE-2019-19138.json +++ b/2019/19xxx/CVE-2019-19138.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19138", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19138", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Ivanti Workspace Control before 10.4.50.0 allows attackers to degrade integrity." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-RES-Workspace-Manager-November-2019", + "refsource": "MISC", + "name": "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-RES-Workspace-Manager-November-2019" + }, + { + "refsource": "MISC", + "name": "https://forums.ivanti.com/s/article/Enhanced-Security-Update-IWC-components", + "url": "https://forums.ivanti.com/s/article/Enhanced-Security-Update-IWC-components" } ] } diff --git a/2020/23xxx/CVE-2020-23545.json b/2020/23xxx/CVE-2020-23545.json index 622ca354416..197883e412c 100644 --- a/2020/23xxx/CVE-2020-23545.json +++ b/2020/23xxx/CVE-2020-23545.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23545", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23545", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ReadXPM_W+0x0000000000000531." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.irfanview.com/plugins.htm", + "refsource": "MISC", + "name": "https://www.irfanview.com/plugins.htm" + }, + { + "url": "https://github.com/nhiephon/Research/blob/master/README.md", + "refsource": "MISC", + "name": "https://github.com/nhiephon/Research/blob/master/README.md" + }, + { + "refsource": "MISC", + "name": "https://github.com/nhiephon/Research/blob/master/Irfanview/0x0000000000000531.MD", + "url": "https://github.com/nhiephon/Research/blob/master/Irfanview/0x0000000000000531.MD" } ] } diff --git a/2021/23xxx/CVE-2021-23151.json b/2021/23xxx/CVE-2021-23151.json new file mode 100644 index 00000000000..e3321ac3745 --- /dev/null +++ b/2021/23xxx/CVE-2021-23151.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23151", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/44xxx/CVE-2021-44771.json b/2021/44xxx/CVE-2021-44771.json new file mode 100644 index 00000000000..d429f17a7bc --- /dev/null +++ b/2021/44xxx/CVE-2021-44771.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-44771", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/45xxx/CVE-2021-45043.json b/2021/45xxx/CVE-2021-45043.json index 8029e20873b..81cfe5025f5 100644 --- a/2021/45xxx/CVE-2021-45043.json +++ b/2021/45xxx/CVE-2021-45043.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-45043", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-45043", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://drive.google.com/file/d/1DlfZz0F8skWy3Mkahx_NMo-sYZh9-eun/view?usp=sharing", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1DlfZz0F8skWy3Mkahx_NMo-sYZh9-eun/view?usp=sharing" + }, + { + "url": "https://drive.google.com/file/d/1bx9yCN-IHYuRpd7g3jhMb0LcTC1ARzSX/view?usp=sharing", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1bx9yCN-IHYuRpd7g3jhMb0LcTC1ARzSX/view?usp=sharing" } ] } diff --git a/2021/4xxx/CVE-2021-4121.json b/2021/4xxx/CVE-2021-4121.json new file mode 100644 index 00000000000..6560bb52897 --- /dev/null +++ b/2021/4xxx/CVE-2021-4121.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4121", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4122.json b/2021/4xxx/CVE-2021-4122.json new file mode 100644 index 00000000000..9b135bb30e3 --- /dev/null +++ b/2021/4xxx/CVE-2021-4122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-4122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file