From a25a85afd4a8b89fe2604274ffab0669687ea19c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 9 Feb 2022 13:01:24 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/25xxx/CVE-2021-25939.json | 15 +++--- 2021/40xxx/CVE-2021-40837.json | 91 +++++++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23378.json | 61 ++++++++++++++++++++--- 3 files changed, 149 insertions(+), 18 deletions(-) diff --git a/2021/25xxx/CVE-2021-25939.json b/2021/25xxx/CVE-2021-25939.json index e4fb9c6304a..06fb364347c 100644 --- a/2021/25xxx/CVE-2021-25939.json +++ b/2021/25xxx/CVE-2021-25939.json @@ -86,15 +86,18 @@ "reference_data": [ { "refsource": "MISC", - "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939" + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939" }, { - "refsource": "CONFIRM", - "url": "https://github.com/arangodb/arangodb/commit/d7b35a6884c6b2802d34d79fb2a79fb2c9ec2175" + "refsource": "MISC", + "url": "https://github.com/arangodb/arangodb/commit/d7b35a6884c6b2802d34d79fb2a79fb2c9ec2175", + "name": "https://github.com/arangodb/arangodb/commit/d7b35a6884c6b2802d34d79fb2a79fb2c9ec2175" }, { - "refsource": "CONFIRM", - "url": "https://github.com/arangodb/arangodb/commit/d9b7f019d2435f107b19a59190bf9cc27d5f34dd" + "refsource": "MISC", + "url": "https://github.com/arangodb/arangodb/commit/d9b7f019d2435f107b19a59190bf9cc27d5f34dd", + "name": "https://github.com/arangodb/arangodb/commit/d9b7f019d2435f107b19a59190bf9cc27d5f34dd" } ] }, @@ -108,4 +111,4 @@ "advisory": "https://www.whitesourcesoftware.com/vulnerability-database/", "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40837.json b/2021/40xxx/CVE-2021-40837.json index 59a84973b8c..1cea8d4f2ac 100644 --- a/2021/40xxx/CVE-2021-40837.json +++ b/2021/40xxx/CVE-2021-40837.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40837", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Denial-of-Service (DoS) Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit), F-Secure Linux Security 64, F-Secure Atlant, F-Secure Internet Gatekeeper & F-Secure Security Cloud", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All Version " + } + ] + } + } + ] + }, + "vendor_name": "F-Secure" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service Vulnerability " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", + "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" + }, + { + "refsource": "MISC", + "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837", + "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "FIX: No User action is required. The required fix has been published through automatic update channel with Capricorn update 2022-02-01_01" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23378.json b/2022/23xxx/CVE-2022-23378.json index 574d0bee8fd..8b48e9d7e6b 100644 --- a/2022/23xxx/CVE-2022-23378.json +++ b/2022/23xxx/CVE-2022-23378.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23378", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23378", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of TastyIgniter. The \"items%5B0%5D%5Bpath%5D\" parameter of a request made to /admin/allergens/edit/1 is vulnerable." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://tastyigniter.com/", + "refsource": "MISC", + "name": "https://tastyigniter.com/" + }, + { + "refsource": "MISC", + "name": "https://github.com/TheGetch/CVE-2022-23378", + "url": "https://github.com/TheGetch/CVE-2022-23378" } ] }