From 7f32cf2814387aeddc12738763183b386c299f3b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 26 Jul 2021 17:00:57 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/25xxx/CVE-2021-25801.json | 56 ++++++++++++++++++++++++++++++---- 2021/25xxx/CVE-2021-25802.json | 56 ++++++++++++++++++++++++++++++---- 2021/25xxx/CVE-2021-25803.json | 56 ++++++++++++++++++++++++++++++---- 2021/25xxx/CVE-2021-25804.json | 56 ++++++++++++++++++++++++++++++---- 2021/31xxx/CVE-2021-31291.json | 56 ++++++++++++++++++++++++++++++---- 2021/31xxx/CVE-2021-31292.json | 56 ++++++++++++++++++++++++++++++---- 2021/32xxx/CVE-2021-32790.json | 10 +++--- 2021/34xxx/CVE-2021-34803.json | 30 ++++++++++++++++++ 2021/37xxx/CVE-2021-37535.json | 18 +++++++++++ 2021/37xxx/CVE-2021-37536.json | 18 +++++++++++ 2021/37xxx/CVE-2021-37537.json | 18 +++++++++++ 2021/37xxx/CVE-2021-37538.json | 18 +++++++++++ 12 files changed, 407 insertions(+), 41 deletions(-) create mode 100644 2021/37xxx/CVE-2021-37535.json create mode 100644 2021/37xxx/CVE-2021-37536.json create mode 100644 2021/37xxx/CVE-2021-37537.json create mode 100644 2021/37xxx/CVE-2021-37538.json diff --git a/2021/25xxx/CVE-2021-25801.json b/2021/25xxx/CVE-2021-25801.json index 8e886a65d1e..4e547bceef2 100644 --- a/2021/25xxx/CVE-2021-25801.json +++ b/2021/25xxx/CVE-2021-25801.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25801", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25801", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability in the __Parse_indx component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://code.videolan.org/videolan/vlc-3.0/-/commit/f5f8cc3ab8825f178de3f6714bfbff8b3f293fd2", + "refsource": "MISC", + "name": "https://code.videolan.org/videolan/vlc-3.0/-/commit/f5f8cc3ab8825f178de3f6714bfbff8b3f293fd2" } ] } diff --git a/2021/25xxx/CVE-2021-25802.json b/2021/25xxx/CVE-2021-25802.json index 7ab5edc53f1..285f4ec5bc1 100644 --- a/2021/25xxx/CVE-2021-25802.json +++ b/2021/25xxx/CVE-2021-25802.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25802", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25802", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability in the AVI_ExtractSubtitle component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://code.videolan.org/videolan/vlc-3.0/-/commit/0660acc3ab64d2c3ad99cae887a438f0648faa72", + "refsource": "MISC", + "name": "https://code.videolan.org/videolan/vlc-3.0/-/commit/0660acc3ab64d2c3ad99cae887a438f0648faa72" } ] } diff --git a/2021/25xxx/CVE-2021-25803.json b/2021/25xxx/CVE-2021-25803.json index ed108339cdc..a550575c400 100644 --- a/2021/25xxx/CVE-2021-25803.json +++ b/2021/25xxx/CVE-2021-25803.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25803", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25803", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability in the vlc_input_attachment_New component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://code.videolan.org/videolan/vlc-3.0/-/commit/56cbe9c4b59edbdc5e1bb2687992f3bbf492eccb", + "refsource": "MISC", + "name": "https://code.videolan.org/videolan/vlc-3.0/-/commit/56cbe9c4b59edbdc5e1bb2687992f3bbf492eccb" } ] } diff --git a/2021/25xxx/CVE-2021-25804.json b/2021/25xxx/CVE-2021-25804.json index 79ea786a36f..d7e5dffbdb7 100644 --- a/2021/25xxx/CVE-2021-25804.json +++ b/2021/25xxx/CVE-2021-25804.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25804", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25804", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A NULL-pointer dereference in \"Open\" in avi.c of VideoLAN VLC Media Player 3.0.11 can a denial of service (DOS) in the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://code.videolan.org/videolan/vlc-3.0/-/commit/a7f577ec26d35bbd7b2a3cda89d1b41bde69de9c", + "refsource": "MISC", + "name": "https://code.videolan.org/videolan/vlc-3.0/-/commit/a7f577ec26d35bbd7b2a3cda89d1b41bde69de9c" } ] } diff --git a/2021/31xxx/CVE-2021-31291.json b/2021/31xxx/CVE-2021-31291.json index 73753d049d6..51ddc9a2f06 100644 --- a/2021/31xxx/CVE-2021-31291.json +++ b/2021/31xxx/CVE-2021-31291.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31291", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31291", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap-based buffer overflow vulnerability in jp2image.cpp of Exiv2 0.27.3 allows attackers to cause a denial of service (DOS) via crafted metadata." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Exiv2/exiv2/issues/1529", + "refsource": "MISC", + "name": "https://github.com/Exiv2/exiv2/issues/1529" } ] } diff --git a/2021/31xxx/CVE-2021-31292.json b/2021/31xxx/CVE-2021-31292.json index 38bb96ef1ca..53171354674 100644 --- a/2021/31xxx/CVE-2021-31292.json +++ b/2021/31xxx/CVE-2021-31292.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-31292", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-31292", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Exiv2/exiv2/issues/1530", + "refsource": "MISC", + "name": "https://github.com/Exiv2/exiv2/issues/1530" } ] } diff --git a/2021/32xxx/CVE-2021-32790.json b/2021/32xxx/CVE-2021-32790.json index 3625badb864..850b5e968b7 100644 --- a/2021/32xxx/CVE-2021-32790.json +++ b/2021/32xxx/CVE-2021-32790.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/woocommerce/woocommerce/security/advisories/GHSA-7vx5-x39w-q24g", - "refsource": "CONFIRM", - "url": "https://github.com/woocommerce/woocommerce/security/advisories/GHSA-7vx5-x39w-q24g" - }, { "name": "https://woocommerce.com/posts/critical-vulnerability-detected-july-2021/", "refsource": "MISC", "url": "https://woocommerce.com/posts/critical-vulnerability-detected-july-2021/" + }, + { + "name": "https://github.com/woocommerce/woocommerce/security/advisories/GHSA-7vx5-x39w-q24g", + "refsource": "CONFIRM", + "url": "https://github.com/woocommerce/woocommerce/security/advisories/GHSA-7vx5-x39w-q24g" } ] }, diff --git a/2021/34xxx/CVE-2021-34803.json b/2021/34xxx/CVE-2021-34803.json index 1e0c7afcdda..4b5f947b3f5 100644 --- a/2021/34xxx/CVE-2021-34803.json +++ b/2021/34xxx/CVE-2021-34803.json @@ -56,6 +56,36 @@ "url": "https://community.teamviewer.com/English/discussion/111154/windows-v14-7-48644", "refsource": "MISC", "name": "https://community.teamviewer.com/English/discussion/111154/windows-v14-7-48644" + }, + { + "refsource": "MISC", + "name": "https://community.teamviewer.com/English/discussion/111153/windows-v14-2-56678", + "url": "https://community.teamviewer.com/English/discussion/111153/windows-v14-2-56678" + }, + { + "refsource": "MISC", + "name": "https://community.teamviewer.com/English/discussion/111152/windows-v13-2-36222", + "url": "https://community.teamviewer.com/English/discussion/111152/windows-v13-2-36222" + }, + { + "refsource": "MISC", + "name": "https://community.teamviewer.com/English/discussion/111151/windows-v12-0-259142", + "url": "https://community.teamviewer.com/English/discussion/111151/windows-v12-0-259142" + }, + { + "refsource": "MISC", + "name": "https://community.teamviewer.com/English/discussion/111150/windows-v11-0-259143", + "url": "https://community.teamviewer.com/English/discussion/111150/windows-v11-0-259143" + }, + { + "refsource": "MISC", + "name": "https://community.teamviewer.com/English/discussion/111149/windows-v10-0-259144", + "url": "https://community.teamviewer.com/English/discussion/111149/windows-v10-0-259144" + }, + { + "refsource": "MISC", + "name": "https://community.teamviewer.com/English/discussion/111147/windows-v9-0-259145", + "url": "https://community.teamviewer.com/English/discussion/111147/windows-v9-0-259145" } ] } diff --git a/2021/37xxx/CVE-2021-37535.json b/2021/37xxx/CVE-2021-37535.json new file mode 100644 index 00000000000..9164a2f5ea0 --- /dev/null +++ b/2021/37xxx/CVE-2021-37535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-37535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/37xxx/CVE-2021-37536.json b/2021/37xxx/CVE-2021-37536.json new file mode 100644 index 00000000000..c75cf81f86e --- /dev/null +++ b/2021/37xxx/CVE-2021-37536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-37536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/37xxx/CVE-2021-37537.json b/2021/37xxx/CVE-2021-37537.json new file mode 100644 index 00000000000..ec4e26c97f9 --- /dev/null +++ b/2021/37xxx/CVE-2021-37537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-37537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/37xxx/CVE-2021-37538.json b/2021/37xxx/CVE-2021-37538.json new file mode 100644 index 00000000000..6163fa348ce --- /dev/null +++ b/2021/37xxx/CVE-2021-37538.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-37538", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file