diff --git a/2014/0xxx/CVE-2014-0224.json b/2014/0xxx/CVE-2014-0224.json index 01458bb4294..cb059868a58 100644 --- a/2014/0xxx/CVE-2014-0224.json +++ b/2014/0xxx/CVE-2014-0224.json @@ -1571,6 +1571,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" } ] } diff --git a/2014/3xxx/CVE-2014-3566.json b/2014/3xxx/CVE-2014-3566.json index ac1685c719a..c24b7215e0d 100644 --- a/2014/3xxx/CVE-2014-3566.json +++ b/2014/3xxx/CVE-2014-3566.json @@ -1371,6 +1371,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7" } ] } diff --git a/2014/6xxx/CVE-2014-6271.json b/2014/6xxx/CVE-2014-6271.json index fe3c6b94501..a7ebecdbae3 100644 --- a/2014/6xxx/CVE-2014-6271.json +++ b/2014/6xxx/CVE-2014-6271.json @@ -931,6 +931,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ] } diff --git a/2014/6xxx/CVE-2014-6278.json b/2014/6xxx/CVE-2014-6278.json index 7d0114ce885..5267fbcdf2b 100644 --- a/2014/6xxx/CVE-2014-6278.json +++ b/2014/6xxx/CVE-2014-6278.json @@ -621,6 +621,11 @@ "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ] } diff --git a/2014/7xxx/CVE-2014-7169.json b/2014/7xxx/CVE-2014-7169.json index adfa2f372a0..5e8cf8868eb 100644 --- a/2014/7xxx/CVE-2014-7169.json +++ b/2014/7xxx/CVE-2014-7169.json @@ -876,6 +876,11 @@ "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" } ] } diff --git a/2014/9xxx/CVE-2014-9293.json b/2014/9xxx/CVE-2014-9293.json index 4ca68be18d3..4a6c63fde13 100644 --- a/2014/9xxx/CVE-2014-9293.json +++ b/2014/9xxx/CVE-2014-9293.json @@ -156,6 +156,11 @@ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1176032", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176032" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8" } ] } diff --git a/2014/9xxx/CVE-2014-9294.json b/2014/9xxx/CVE-2014-9294.json index d252c40f46c..7d106388cfd 100644 --- a/2014/9xxx/CVE-2014-9294.json +++ b/2014/9xxx/CVE-2014-9294.json @@ -156,6 +156,11 @@ "name": "MDVSA-2015:003", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8" } ] } diff --git a/2014/9xxx/CVE-2014-9295.json b/2014/9xxx/CVE-2014-9295.json index 5e47f6fc2ce..1f4a6122b5f 100644 --- a/2014/9xxx/CVE-2014-9295.json +++ b/2014/9xxx/CVE-2014-9295.json @@ -191,6 +191,11 @@ "name": "http://bugs.ntp.org/show_bug.cgi?id=2669", "refsource": "CONFIRM", "url": "http://bugs.ntp.org/show_bug.cgi?id=2669" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8" } ] } diff --git a/2014/9xxx/CVE-2014-9296.json b/2014/9xxx/CVE-2014-9296.json index 3a3890e6a70..f752e2910b4 100644 --- a/2014/9xxx/CVE-2014-9296.json +++ b/2014/9xxx/CVE-2014-9296.json @@ -146,6 +146,11 @@ "name": "MDVSA-2015:003", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8" } ] } diff --git a/2015/0xxx/CVE-2015-0235.json b/2015/0xxx/CVE-2015-0235.json index 50c9ee38ab2..e9dc31c8b55 100644 --- a/2015/0xxx/CVE-2015-0235.json +++ b/2015/0xxx/CVE-2015-0235.json @@ -496,6 +496,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9" } ] } diff --git a/2015/3xxx/CVE-2015-3456.json b/2015/3xxx/CVE-2015-3456.json index 6e7369033f4..99b6f11d373 100644 --- a/2015/3xxx/CVE-2015-3456.json +++ b/2015/3xxx/CVE-2015-3456.json @@ -291,6 +291,11 @@ "name": "RHSA-2015:1000", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1000.html" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10" } ] } diff --git a/2015/5xxx/CVE-2015-5600.json b/2015/5xxx/CVE-2015-5600.json index f324c4c9eeb..56c3e2c5f0f 100644 --- a/2015/5xxx/CVE-2015-5600.json +++ b/2015/5xxx/CVE-2015-5600.json @@ -206,6 +206,11 @@ "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12" } ] } diff --git a/2015/6xxx/CVE-2015-6855.json b/2015/6xxx/CVE-2015-6855.json index 9826f35a737..12476054948 100644 --- a/2015/6xxx/CVE-2015-6855.json +++ b/2015/6xxx/CVE-2015-6855.json @@ -126,6 +126,11 @@ "name": "GLSA-201602-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201602-01" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14" } ] } diff --git a/2015/7xxx/CVE-2015-7704.json b/2015/7xxx/CVE-2015-7704.json index c5189ec5682..cad5d1309d4 100644 --- a/2015/7xxx/CVE-2015-7704.json +++ b/2015/7xxx/CVE-2015-7704.json @@ -146,6 +146,11 @@ "refsource": "CONFIRM", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" } ] } diff --git a/2015/7xxx/CVE-2015-7705.json b/2015/7xxx/CVE-2015-7705.json index f9231ea4ea9..452bc938310 100644 --- a/2015/7xxx/CVE-2015-7705.json +++ b/2015/7xxx/CVE-2015-7705.json @@ -226,6 +226,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" + }, + { + "refsource": "MISC", + "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016", + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" } ] } diff --git a/2020/23xxx/CVE-2020-23565.json b/2020/23xxx/CVE-2020-23565.json index 2d8609e269c..f26ffcfba64 100644 --- a/2020/23xxx/CVE-2020-23565.json +++ b/2020/23xxx/CVE-2020-23565.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23565", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23565", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Irfanview v4.53 allows attackers to execute arbitrary code via a crafted JPEG 2000 file. Related to a \"Data from Faulting Address controls Branch Selection starting at JPEG2000!ShowPlugInSaveOptions_W+0x0000000000032850\"." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/3", + "refsource": "MISC", + "name": "https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/3" } ] } diff --git a/2020/23xxx/CVE-2020-23566.json b/2020/23xxx/CVE-2020-23566.json index 411593b704b..854fc6d88ad 100644 --- a/2020/23xxx/CVE-2020-23566.json +++ b/2020/23xxx/CVE-2020-23566.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23566", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23566", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Irfanview v4.53 was discovered to contain an infinity loop via JPEG2000!ShowPlugInSaveOptions_W+0x1ecd8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/1", + "refsource": "MISC", + "name": "https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/1" } ] } diff --git a/2020/23xxx/CVE-2020-23567.json b/2020/23xxx/CVE-2020-23567.json index 9c5e7f44f93..6e121d17288 100644 --- a/2020/23xxx/CVE-2020-23567.json +++ b/2020/23xxx/CVE-2020-23567.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23567", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23567", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Irfanview v4.53 allows attackers to to cause a denial of service (DoS) via a crafted JPEG 2000 file. Related to \"Integer Divide By Zero starting at JPEG2000!ShowPlugInSaveOptions_W+0x00000000000082ea\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/2", + "refsource": "MISC", + "name": "https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/2" } ] } diff --git a/2021/43xxx/CVE-2021-43401.json b/2021/43xxx/CVE-2021-43401.json new file mode 100644 index 00000000000..7888cd2d0c2 --- /dev/null +++ b/2021/43xxx/CVE-2021-43401.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43401", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43402.json b/2021/43xxx/CVE-2021-43402.json new file mode 100644 index 00000000000..3561fef4cc2 --- /dev/null +++ b/2021/43xxx/CVE-2021-43402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file