From a25907007e1418e0714e9ab8fc9d2d1d37df88a5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 9 Aug 2021 16:00:49 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2007/0xxx/CVE-2007-0843.json | 5 ++++ 2015/2xxx/CVE-2015-2418.json | 5 ++++ 2021/21xxx/CVE-2021-21740.json | 50 ++++++++++++++++++++++++++++++++-- 2021/26xxx/CVE-2021-26586.json | 5 ++++ 2021/32xxx/CVE-2021-32767.json | 4 +-- 2021/38xxx/CVE-2021-38138.json | 5 ++++ 2021/3xxx/CVE-2021-3693.json | 18 ++++++++++++ 2021/3xxx/CVE-2021-3694.json | 18 ++++++++++++ 8 files changed, 105 insertions(+), 5 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3693.json create mode 100644 2021/3xxx/CVE-2021-3694.json diff --git a/2007/0xxx/CVE-2007-0843.json b/2007/0xxx/CVE-2007-0843.json index 5abdca8a596..4e1e20866a3 100644 --- a/2007/0xxx/CVE-2007-0843.json +++ b/2007/0xxx/CVE-2007-0843.json @@ -101,6 +101,11 @@ "name": "2282", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2282" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html" } ] } diff --git a/2015/2xxx/CVE-2015-2418.json b/2015/2xxx/CVE-2015-2418.json index 3303a39ae18..78a64178997 100644 --- a/2015/2xxx/CVE-2015-2418.json +++ b/2015/2xxx/CVE-2015-2418.json @@ -61,6 +61,11 @@ "name": "1032901", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032901" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html" } ] } diff --git a/2021/21xxx/CVE-2021-21740.json b/2021/21xxx/CVE-2021-21740.json index 9287eec44ce..440c641b3a8 100644 --- a/2021/21xxx/CVE-2021-21740.json +++ b/2021/21xxx/CVE-2021-21740.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21740", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@zte.com.cn", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ZXHN H2640", + "version": { + "version_data": [ + { + "version_value": "V10.0.0C6_TY" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "information leak" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1017244", + "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1017244" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is an information leak vulnerability in the digital media player (DMS) of ZTE's residential gateway product. The attacker could insert the USB disk with the symbolic link into the residential gateway, and access unauthorized directory information through the symbolic link, causing information leak." } ] } diff --git a/2021/26xxx/CVE-2021-26586.json b/2021/26xxx/CVE-2021-26586.json index 8418c7225a9..59f811831c5 100644 --- a/2021/26xxx/CVE-2021-26586.json +++ b/2021/26xxx/CVE-2021-26586.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04180en_us", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04180en_us" + }, + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2021-33", + "url": "https://www.tenable.com/security/research/tra-2021-33" } ] }, diff --git a/2021/32xxx/CVE-2021-32767.json b/2021/32xxx/CVE-2021-32767.json index f851c20eb84..4d0ab5d4531 100644 --- a/2021/32xxx/CVE-2021-32767.json +++ b/2021/32xxx/CVE-2021-32767.json @@ -81,9 +81,9 @@ "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235" }, { - "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-013", "refsource": "MISC", - "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-013" + "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-012", + "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-012" } ] }, diff --git a/2021/38xxx/CVE-2021-38138.json b/2021/38xxx/CVE-2021-38138.json index eeaceba373b..97e3aa1b94a 100644 --- a/2021/38xxx/CVE-2021-38138.json +++ b/2021/38xxx/CVE-2021-38138.json @@ -61,6 +61,11 @@ "url": "https://github.com/helloxz/onenav/releases", "refsource": "MISC", "name": "https://github.com/helloxz/onenav/releases" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html" } ] } diff --git a/2021/3xxx/CVE-2021-3693.json b/2021/3xxx/CVE-2021-3693.json new file mode 100644 index 00000000000..5d8fb68ad7d --- /dev/null +++ b/2021/3xxx/CVE-2021-3693.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3693", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3694.json b/2021/3xxx/CVE-2021-3694.json new file mode 100644 index 00000000000..a42307c4015 --- /dev/null +++ b/2021/3xxx/CVE-2021-3694.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3694", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file