diff --git a/2019/5xxx/CVE-2019-5317.json b/2019/5xxx/CVE-2019-5317.json index 73decb5a6f7..506c626b3e5 100644 --- a/2019/5xxx/CVE-2019-5317.json +++ b/2019/5xxx/CVE-2019-5317.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2019/5xxx/CVE-2019-5319.json b/2019/5xxx/CVE-2019-5319.json index 8cd42e65559..5b7165decea 100644 --- a/2019/5xxx/CVE-2019-5319.json +++ b/2019/5xxx/CVE-2019-5319.json @@ -60,6 +60,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2019/8xxx/CVE-2019-8259.json b/2019/8xxx/CVE-2019-8259.json index 820aabe7588..3d39b55bbee 100644 --- a/2019/8xxx/CVE-2019-8259.json +++ b/2019/8xxx/CVE-2019-8259.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8260.json b/2019/8xxx/CVE-2019-8260.json index a89793b7ac2..bf62822fb7c 100644 --- a/2019/8xxx/CVE-2019-8260.json +++ b/2019/8xxx/CVE-2019-8260.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8261.json b/2019/8xxx/CVE-2019-8261.json index 26b822ad74b..4972461c476 100644 --- a/2019/8xxx/CVE-2019-8261.json +++ b/2019/8xxx/CVE-2019-8261.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8262.json b/2019/8xxx/CVE-2019-8262.json index 30003162c86..828a9c64244 100644 --- a/2019/8xxx/CVE-2019-8262.json +++ b/2019/8xxx/CVE-2019-8262.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8263.json b/2019/8xxx/CVE-2019-8263.json index 69a524e6487..cd2ab4b6a9d 100644 --- a/2019/8xxx/CVE-2019-8263.json +++ b/2019/8xxx/CVE-2019-8263.json @@ -72,6 +72,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8264.json b/2019/8xxx/CVE-2019-8264.json index d96d2949638..9181356fa11 100644 --- a/2019/8xxx/CVE-2019-8264.json +++ b/2019/8xxx/CVE-2019-8264.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8265.json b/2019/8xxx/CVE-2019-8265.json index 3af520d5d53..739581334f3 100644 --- a/2019/8xxx/CVE-2019-8265.json +++ b/2019/8xxx/CVE-2019-8265.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8275.json b/2019/8xxx/CVE-2019-8275.json index ccf00664179..1a453516123 100644 --- a/2019/8xxx/CVE-2019-8275.json +++ b/2019/8xxx/CVE-2019-8275.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2019/8xxx/CVE-2019-8277.json b/2019/8xxx/CVE-2019-8277.json index e2dc257fe2b..ca18ba14aa0 100644 --- a/2019/8xxx/CVE-2019-8277.json +++ b/2019/8xxx/CVE-2019-8277.json @@ -58,6 +58,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] }, diff --git a/2019/8xxx/CVE-2019-8280.json b/2019/8xxx/CVE-2019-8280.json index 4bc38485924..f4c38b6f83b 100644 --- a/2019/8xxx/CVE-2019-8280.json +++ b/2019/8xxx/CVE-2019-8280.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-06" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf" } ] } diff --git a/2020/0xxx/CVE-2020-0590.json b/2020/0xxx/CVE-2020-0590.json index 7cc151e5a8f..94bd3001c20 100644 --- a/2020/0xxx/CVE-2020-0590.json +++ b/2020/0xxx/CVE-2020-0590.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201113-0001/", "url": "https://security.netapp.com/advisory/ntap-20201113-0001/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ] }, diff --git a/2020/0xxx/CVE-2020-0591.json b/2020/0xxx/CVE-2020-0591.json index 406d3e1c146..ec8c688010f 100644 --- a/2020/0xxx/CVE-2020-0591.json +++ b/2020/0xxx/CVE-2020-0591.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201113-0001/", "url": "https://security.netapp.com/advisory/ntap-20201113-0001/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf" } ] }, diff --git a/2020/15xxx/CVE-2020-15798.json b/2020/15xxx/CVE-2020-15798.json index 8211d85c545..8ec0ff42e14 100644 --- a/2020/15xxx/CVE-2020-15798.json +++ b/2020/15xxx/CVE-2020-15798.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-033-02", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-033-02" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-752103.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-752103.pdf" } ] } diff --git a/2020/24xxx/CVE-2020-24635.json b/2020/24xxx/CVE-2020-24635.json index d13eb0caca8..7173e224fde 100644 --- a/2020/24xxx/CVE-2020-24635.json +++ b/2020/24xxx/CVE-2020-24635.json @@ -60,6 +60,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2020/24xxx/CVE-2020-24636.json b/2020/24xxx/CVE-2020-24636.json index d57f53bbc61..bb40d35acde 100644 --- a/2020/24xxx/CVE-2020-24636.json +++ b/2020/24xxx/CVE-2020-24636.json @@ -60,6 +60,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2020/25xxx/CVE-2020-25705.json b/2020/25xxx/CVE-2020-25705.json index 02dbf34942b..205378161e4 100644 --- a/2020/25xxx/CVE-2020-25705.json +++ b/2020/25xxx/CVE-2020-25705.json @@ -63,6 +63,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-324955.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-324955.pdf" } ] }, diff --git a/2020/35xxx/CVE-2020-35438.json b/2020/35xxx/CVE-2020-35438.json index fb1bb7651f8..18b122b9ea8 100644 --- a/2020/35xxx/CVE-2020-35438.json +++ b/2020/35xxx/CVE-2020-35438.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35438", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35438", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability in the kk Star Ratings plugin before 4.1.5." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kamalkhan/kk-star-ratings/blob/master/CHANGELOG.md", + "refsource": "MISC", + "name": "https://github.com/kamalkhan/kk-star-ratings/blob/master/CHANGELOG.md" + }, + { + "refsource": "MISC", + "name": "https://github.com/kamalkhan/kk-star-ratings/blob/master/CHANGELOG.md#415---2020-12-13", + "url": "https://github.com/kamalkhan/kk-star-ratings/blob/master/CHANGELOG.md#415---2020-12-13" } ] } diff --git a/2020/8xxx/CVE-2020-8694.json b/2020/8xxx/CVE-2020-8694.json index 29cbcec18d1..a3a33235987 100644 --- a/2020/8xxx/CVE-2020-8694.json +++ b/2020/8xxx/CVE-2020-8694.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ] }, diff --git a/2020/8xxx/CVE-2020-8698.json b/2020/8xxx/CVE-2020-8698.json index 8ef3e20b1de..d59cec4d4ae 100644 --- a/2020/8xxx/CVE-2020-8698.json +++ b/2020/8xxx/CVE-2020-8698.json @@ -63,6 +63,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ] }, diff --git a/2020/8xxx/CVE-2020-8744.json b/2020/8xxx/CVE-2020-8744.json index 9546cc7ae9a..e7210fc336e 100644 --- a/2020/8xxx/CVE-2020-8744.json +++ b/2020/8xxx/CVE-2020-8744.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201113-0002/", "url": "https://security.netapp.com/advisory/ntap-20201113-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf" } ] }, diff --git a/2020/8xxx/CVE-2020-8745.json b/2020/8xxx/CVE-2020-8745.json index bf61066c55b..4208dd95a2f 100644 --- a/2020/8xxx/CVE-2020-8745.json +++ b/2020/8xxx/CVE-2020-8745.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20201113-0002/", "url": "https://security.netapp.com/advisory/ntap-20201113-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ] }, diff --git a/2021/20xxx/CVE-2021-20590.json b/2021/20xxx/CVE-2021-20590.json index 5c02ee008a0..adef2a3f03b 100644 --- a/2021/20xxx/CVE-2021-20590.json +++ b/2021/20xxx/CVE-2021-20590.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20590", - "ASSIGNER": "vultures@jpcert.or.jp", + "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "STATE": "PUBLIC" }, "affects": { diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index b0ca3a70c7b..cdb672150eb 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -393,6 +393,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E", "url": "https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[flink-issues] 20210511 [jira] [Commented] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx", + "url": "https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21409.json b/2021/21xxx/CVE-2021-21409.json index d492395a9ce..e63fdd27ab5 100644 --- a/2021/21xxx/CVE-2021-21409.json +++ b/2021/21xxx/CVE-2021-21409.json @@ -213,6 +213,11 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210506 [GitHub] [kafka] dongjinleekr opened a new pull request #10642: KAFKA-12756: Update Zookeeper to 3.6.3 or higher", "url": "https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[flink-issues] 20210511 [jira] [Commented] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx", + "url": "https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E" } ] }, diff --git a/2021/25xxx/CVE-2021-25143.json b/2021/25xxx/CVE-2021-25143.json index 038693ece14..d8147f7a5a3 100644 --- a/2021/25xxx/CVE-2021-25143.json +++ b/2021/25xxx/CVE-2021-25143.json @@ -54,6 +54,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25144.json b/2021/25xxx/CVE-2021-25144.json index 7cb19c92783..f34a5d11538 100644 --- a/2021/25xxx/CVE-2021-25144.json +++ b/2021/25xxx/CVE-2021-25144.json @@ -60,6 +60,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25145.json b/2021/25xxx/CVE-2021-25145.json index 59dd937883b..7265bc88c03 100644 --- a/2021/25xxx/CVE-2021-25145.json +++ b/2021/25xxx/CVE-2021-25145.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25146.json b/2021/25xxx/CVE-2021-25146.json index 4affd429ba4..819582d8774 100644 --- a/2021/25xxx/CVE-2021-25146.json +++ b/2021/25xxx/CVE-2021-25146.json @@ -60,6 +60,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25148.json b/2021/25xxx/CVE-2021-25148.json index 65f906c21f1..b2fcd6cacc0 100644 --- a/2021/25xxx/CVE-2021-25148.json +++ b/2021/25xxx/CVE-2021-25148.json @@ -57,6 +57,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25149.json b/2021/25xxx/CVE-2021-25149.json index 836731830a3..24af5cea780 100644 --- a/2021/25xxx/CVE-2021-25149.json +++ b/2021/25xxx/CVE-2021-25149.json @@ -60,6 +60,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25150.json b/2021/25xxx/CVE-2021-25150.json index 285b4fc7129..060d26d20a4 100644 --- a/2021/25xxx/CVE-2021-25150.json +++ b/2021/25xxx/CVE-2021-25150.json @@ -57,6 +57,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25155.json b/2021/25xxx/CVE-2021-25155.json index 447f58bdb88..e96f6b7ff64 100644 --- a/2021/25xxx/CVE-2021-25155.json +++ b/2021/25xxx/CVE-2021-25155.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25156.json b/2021/25xxx/CVE-2021-25156.json index 79a04d9837e..7397fc8c31c 100644 --- a/2021/25xxx/CVE-2021-25156.json +++ b/2021/25xxx/CVE-2021-25156.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25157.json b/2021/25xxx/CVE-2021-25157.json index 08686837013..f0aa0f88123 100644 --- a/2021/25xxx/CVE-2021-25157.json +++ b/2021/25xxx/CVE-2021-25157.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25158.json b/2021/25xxx/CVE-2021-25158.json index 34833a30177..37ab34caa83 100644 --- a/2021/25xxx/CVE-2021-25158.json +++ b/2021/25xxx/CVE-2021-25158.json @@ -60,6 +60,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25159.json b/2021/25xxx/CVE-2021-25159.json index b4a0dd5f5f9..b3d811b0216 100644 --- a/2021/25xxx/CVE-2021-25159.json +++ b/2021/25xxx/CVE-2021-25159.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25160.json b/2021/25xxx/CVE-2021-25160.json index 6cbbec39d3f..3eef3398d08 100644 --- a/2021/25xxx/CVE-2021-25160.json +++ b/2021/25xxx/CVE-2021-25160.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25161.json b/2021/25xxx/CVE-2021-25161.json index 535482e3e10..8f8ad240abd 100644 --- a/2021/25xxx/CVE-2021-25161.json +++ b/2021/25xxx/CVE-2021-25161.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25162.json b/2021/25xxx/CVE-2021-25162.json index 543e83ab966..30e99da1a0e 100644 --- a/2021/25xxx/CVE-2021-25162.json +++ b/2021/25xxx/CVE-2021-25162.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" } ] }, diff --git a/2021/30xxx/CVE-2021-30482.json b/2021/30xxx/CVE-2021-30482.json index 48663fbcba7..c809b3070bd 100644 --- a/2021/30xxx/CVE-2021-30482.json +++ b/2021/30xxx/CVE-2021-30482.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-30482", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-30482", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains UpSource before 2020.1.1883, application passwords were not revoked correctly" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31897.json b/2021/31xxx/CVE-2021-31897.json index 37ed44a4816..8d346d2e6b6 100644 --- a/2021/31xxx/CVE-2021-31897.json +++ b/2021/31xxx/CVE-2021-31897.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31897", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31897", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains WebStorm before 2021.1, code execution without user confirmation was possible for untrusted projects." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31898.json b/2021/31xxx/CVE-2021-31898.json index bcbf30e72e2..df112df842b 100644 --- a/2021/31xxx/CVE-2021-31898.json +++ b/2021/31xxx/CVE-2021-31898.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31898", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31898", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains WebStorm before 2021.1, HTTP requests were used instead of HTTPS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31910.json b/2021/31xxx/CVE-2021-31910.json index 6ce3f38310b..cac2bf50ff8 100644 --- a/2021/31xxx/CVE-2021-31910.json +++ b/2021/31xxx/CVE-2021-31910.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31910", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31910", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains TeamCity before 2020.2.3, information disclosure via SSRF was possible." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31911.json b/2021/31xxx/CVE-2021-31911.json index 1a3a59ee89f..e8f6dfb2822 100644 --- a/2021/31xxx/CVE-2021-31911.json +++ b/2021/31xxx/CVE-2021-31911.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31911", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31911", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains TeamCity before 2020.2.3, reflected XSS was possible on several pages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31912.json b/2021/31xxx/CVE-2021-31912.json index 0b46c40a248..0f7f4b0d089 100644 --- a/2021/31xxx/CVE-2021-31912.json +++ b/2021/31xxx/CVE-2021-31912.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31912", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31912", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains TeamCity before 2020.2.3, account takeover was potentially possible during a password reset." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31913.json b/2021/31xxx/CVE-2021-31913.json index a52d913f205..a9f9b27779a 100644 --- a/2021/31xxx/CVE-2021-31913.json +++ b/2021/31xxx/CVE-2021-31913.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31913", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31913", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains TeamCity before 2020.2.3, insufficient checks of the redirect_uri were made during GitHub SSO token exchange." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31914.json b/2021/31xxx/CVE-2021-31914.json index 9880e634922..59e450eef16 100644 --- a/2021/31xxx/CVE-2021-31914.json +++ b/2021/31xxx/CVE-2021-31914.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31914", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31914", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains TeamCity before 2020.2.4 on Windows, arbitrary code execution on TeamCity Server was possible." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] } diff --git a/2021/31xxx/CVE-2021-31915.json b/2021/31xxx/CVE-2021-31915.json index 259238618b7..4ca2e8cb1f2 100644 --- a/2021/31xxx/CVE-2021-31915.json +++ b/2021/31xxx/CVE-2021-31915.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31915", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31915", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In JetBrains TeamCity before 2020.2.4, OS command injection leading to remote code execution was possible." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jetbrains.com", + "refsource": "MISC", + "name": "https://blog.jetbrains.com" + }, + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/", + "url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/" } ] }