From bde7ee23e93e194fd08baad9926422961ef78944 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 12 Jan 2021 20:03:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/2xxx/CVE-2019-2859.json | 5 + 2019/2xxx/CVE-2019-2864.json | 5 + 2019/2xxx/CVE-2019-2865.json | 5 + 2019/2xxx/CVE-2019-2866.json | 5 + 2019/2xxx/CVE-2019-2867.json | 5 + 2019/2xxx/CVE-2019-2873.json | 5 + 2019/2xxx/CVE-2019-2874.json | 5 + 2019/2xxx/CVE-2019-2875.json | 5 + 2019/2xxx/CVE-2019-2876.json | 5 + 2019/2xxx/CVE-2019-2944.json | 5 + 2019/2xxx/CVE-2019-2984.json | 5 + 2019/3xxx/CVE-2019-3002.json | 5 + 2019/3xxx/CVE-2019-3005.json | 5 + 2019/3xxx/CVE-2019-3017.json | 5 + 2019/3xxx/CVE-2019-3021.json | 5 + 2019/3xxx/CVE-2019-3026.json | 5 + 2020/14xxx/CVE-2020-14646.json | 5 + 2020/14xxx/CVE-2020-14647.json | 5 + 2020/14xxx/CVE-2020-14648.json | 5 + 2020/14xxx/CVE-2020-14649.json | 5 + 2020/14xxx/CVE-2020-14650.json | 5 + 2020/14xxx/CVE-2020-14674.json | 5 + 2020/14xxx/CVE-2020-14677.json | 5 + 2020/14xxx/CVE-2020-14694.json | 5 + 2020/14xxx/CVE-2020-14700.json | 5 + 2020/14xxx/CVE-2020-14703.json | 5 + 2020/14xxx/CVE-2020-14704.json | 5 + 2020/14xxx/CVE-2020-14713.json | 5 + 2020/14xxx/CVE-2020-14714.json | 5 + 2020/14xxx/CVE-2020-14715.json | 5 + 2020/2xxx/CVE-2020-2681.json | 5 + 2020/2xxx/CVE-2020-2682.json | 5 + 2020/2xxx/CVE-2020-2690.json | 5 + 2020/2xxx/CVE-2020-2691.json | 5 + 2020/2xxx/CVE-2020-2692.json | 5 + 2020/2xxx/CVE-2020-2693.json | 5 + 2020/2xxx/CVE-2020-2701.json | 5 + 2020/2xxx/CVE-2020-2702.json | 5 + 2020/2xxx/CVE-2020-2703.json | 5 + 2020/2xxx/CVE-2020-2705.json | 5 + 2020/2xxx/CVE-2020-2725.json | 5 + 2020/2xxx/CVE-2020-2726.json | 5 + 2020/2xxx/CVE-2020-2741.json | 5 + 2020/2xxx/CVE-2020-2742.json | 5 + 2020/2xxx/CVE-2020-2743.json | 5 + 2020/2xxx/CVE-2020-2758.json | 5 + 2020/2xxx/CVE-2020-2902.json | 5 + 2020/2xxx/CVE-2020-2905.json | 5 + 2020/2xxx/CVE-2020-2907.json | 5 + 2020/2xxx/CVE-2020-2910.json | 5 + 2020/2xxx/CVE-2020-2914.json | 5 + 2020/2xxx/CVE-2020-2951.json | 5 + 2020/2xxx/CVE-2020-2958.json | 5 + 2020/36xxx/CVE-2020-36190.json | 72 +++++ 2020/4xxx/CVE-2020-4079.json | 2 +- 2021/1xxx/CVE-2021-1636.json | 316 +++++++++++----------- 2021/1xxx/CVE-2021-1637.json | 472 +++++++++++++++++---------------- 2021/1xxx/CVE-2021-1638.json | 406 ++++++++++++++-------------- 2021/1xxx/CVE-2021-1641.json | 152 +++++------ 2021/3xxx/CVE-2021-3135.json | 18 ++ 60 files changed, 1033 insertions(+), 670 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36190.json create mode 100644 2021/3xxx/CVE-2021-3135.json diff --git a/2019/2xxx/CVE-2019-2859.json b/2019/2xxx/CVE-2019-2859.json index 6e0ae86794f..cfda869c216 100644 --- a/2019/2xxx/CVE-2019-2859.json +++ b/2019/2xxx/CVE-2019-2859.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2864.json b/2019/2xxx/CVE-2019-2864.json index d1af5f7794b..2070947acc7 100644 --- a/2019/2xxx/CVE-2019-2864.json +++ b/2019/2xxx/CVE-2019-2864.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2865.json b/2019/2xxx/CVE-2019-2865.json index c89d80ddccd..afad0ca80dc 100644 --- a/2019/2xxx/CVE-2019-2865.json +++ b/2019/2xxx/CVE-2019-2865.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2866.json b/2019/2xxx/CVE-2019-2866.json index ab07a748618..6f65cbd30e0 100644 --- a/2019/2xxx/CVE-2019-2866.json +++ b/2019/2xxx/CVE-2019-2866.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2867.json b/2019/2xxx/CVE-2019-2867.json index b85099ec424..e7b22120556 100644 --- a/2019/2xxx/CVE-2019-2867.json +++ b/2019/2xxx/CVE-2019-2867.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-963/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-963/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2873.json b/2019/2xxx/CVE-2019-2873.json index 3527ec06b6b..2a1291e0f7b 100644 --- a/2019/2xxx/CVE-2019-2873.json +++ b/2019/2xxx/CVE-2019-2873.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2874.json b/2019/2xxx/CVE-2019-2874.json index 211d842501a..33b4eecf520 100644 --- a/2019/2xxx/CVE-2019-2874.json +++ b/2019/2xxx/CVE-2019-2874.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2875.json b/2019/2xxx/CVE-2019-2875.json index 578ca073987..13d8184af8f 100644 --- a/2019/2xxx/CVE-2019-2875.json +++ b/2019/2xxx/CVE-2019-2875.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2876.json b/2019/2xxx/CVE-2019-2876.json index 4592bc0a755..5c5d109eb25 100644 --- a/2019/2xxx/CVE-2019-2876.json +++ b/2019/2xxx/CVE-2019-2876.json @@ -66,6 +66,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1814", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2944.json b/2019/2xxx/CVE-2019-2944.json index 9f1cdeb1db6..2810c880dff 100644 --- a/2019/2xxx/CVE-2019-2944.json +++ b/2019/2xxx/CVE-2019-2944.json @@ -66,6 +66,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/2xxx/CVE-2019-2984.json b/2019/2xxx/CVE-2019-2984.json index 2e70ff23a71..2475e859fa7 100644 --- a/2019/2xxx/CVE-2019-2984.json +++ b/2019/2xxx/CVE-2019-2984.json @@ -66,6 +66,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/3xxx/CVE-2019-3002.json b/2019/3xxx/CVE-2019-3002.json index a0adef94645..13f6ae2be7c 100644 --- a/2019/3xxx/CVE-2019-3002.json +++ b/2019/3xxx/CVE-2019-3002.json @@ -66,6 +66,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/3xxx/CVE-2019-3005.json b/2019/3xxx/CVE-2019-3005.json index 10b9aa6e32e..7c5927c9928 100644 --- a/2019/3xxx/CVE-2019-3005.json +++ b/2019/3xxx/CVE-2019-3005.json @@ -66,6 +66,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/3xxx/CVE-2019-3017.json b/2019/3xxx/CVE-2019-3017.json index 543d31227da..c3a217bcb7d 100644 --- a/2019/3xxx/CVE-2019-3017.json +++ b/2019/3xxx/CVE-2019-3017.json @@ -71,6 +71,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/3xxx/CVE-2019-3021.json b/2019/3xxx/CVE-2019-3021.json index 0cda02d9063..76286090660 100644 --- a/2019/3xxx/CVE-2019-3021.json +++ b/2019/3xxx/CVE-2019-3021.json @@ -66,6 +66,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2019/3xxx/CVE-2019-3026.json b/2019/3xxx/CVE-2019-3026.json index 4de6e252af7..6fccc3b5b7a 100644 --- a/2019/3xxx/CVE-2019-3026.json +++ b/2019/3xxx/CVE-2019-3026.json @@ -71,6 +71,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14646.json b/2020/14xxx/CVE-2020-14646.json index 56fa1c8c71d..02162a17a40 100644 --- a/2020/14xxx/CVE-2020-14646.json +++ b/2020/14xxx/CVE-2020-14646.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14647.json b/2020/14xxx/CVE-2020-14647.json index 3971ed53bce..df10ab1d5fe 100644 --- a/2020/14xxx/CVE-2020-14647.json +++ b/2020/14xxx/CVE-2020-14647.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14648.json b/2020/14xxx/CVE-2020-14648.json index 246b01504d5..a642d3ca1d1 100644 --- a/2020/14xxx/CVE-2020-14648.json +++ b/2020/14xxx/CVE-2020-14648.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14649.json b/2020/14xxx/CVE-2020-14649.json index 5592e7ed722..c14951637d9 100644 --- a/2020/14xxx/CVE-2020-14649.json +++ b/2020/14xxx/CVE-2020-14649.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14650.json b/2020/14xxx/CVE-2020-14650.json index 696074182d0..90960a07ac0 100644 --- a/2020/14xxx/CVE-2020-14650.json +++ b/2020/14xxx/CVE-2020-14650.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14674.json b/2020/14xxx/CVE-2020-14674.json index ee06a827173..7b902dc7dec 100644 --- a/2020/14xxx/CVE-2020-14674.json +++ b/2020/14xxx/CVE-2020-14674.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14677.json b/2020/14xxx/CVE-2020-14677.json index 74891008fe8..7578e102ec6 100644 --- a/2020/14xxx/CVE-2020-14677.json +++ b/2020/14xxx/CVE-2020-14677.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14694.json b/2020/14xxx/CVE-2020-14694.json index e2dc65dd851..d10960c73b2 100644 --- a/2020/14xxx/CVE-2020-14694.json +++ b/2020/14xxx/CVE-2020-14694.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14700.json b/2020/14xxx/CVE-2020-14700.json index 2b7fdcf5e68..03888e48253 100644 --- a/2020/14xxx/CVE-2020-14700.json +++ b/2020/14xxx/CVE-2020-14700.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14703.json b/2020/14xxx/CVE-2020-14703.json index b3f57592b3d..94cb888b648 100644 --- a/2020/14xxx/CVE-2020-14703.json +++ b/2020/14xxx/CVE-2020-14703.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14704.json b/2020/14xxx/CVE-2020-14704.json index a325c520d64..48e31a6cd4f 100644 --- a/2020/14xxx/CVE-2020-14704.json +++ b/2020/14xxx/CVE-2020-14704.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14713.json b/2020/14xxx/CVE-2020-14713.json index c6232e577db..b1d680f12ec 100644 --- a/2020/14xxx/CVE-2020-14713.json +++ b/2020/14xxx/CVE-2020-14713.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14714.json b/2020/14xxx/CVE-2020-14714.json index b001f0d08fb..bcb34ce9080 100644 --- a/2020/14xxx/CVE-2020-14714.json +++ b/2020/14xxx/CVE-2020-14714.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/14xxx/CVE-2020-14715.json b/2020/14xxx/CVE-2020-14715.json index 16fb1d4534f..0700916fd41 100644 --- a/2020/14xxx/CVE-2020-14715.json +++ b/2020/14xxx/CVE-2020-14715.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1511", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2681.json b/2020/2xxx/CVE-2020-2681.json index bd6efb78f06..f9611082807 100644 --- a/2020/2xxx/CVE-2020-2681.json +++ b/2020/2xxx/CVE-2020-2681.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2682.json b/2020/2xxx/CVE-2020-2682.json index e625f7111a9..1927339056c 100644 --- a/2020/2xxx/CVE-2020-2682.json +++ b/2020/2xxx/CVE-2020-2682.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2690.json b/2020/2xxx/CVE-2020-2690.json index c97a7f10a9f..1324125205b 100644 --- a/2020/2xxx/CVE-2020-2690.json +++ b/2020/2xxx/CVE-2020-2690.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2691.json b/2020/2xxx/CVE-2020-2691.json index aa2855207d7..986344eebd3 100644 --- a/2020/2xxx/CVE-2020-2691.json +++ b/2020/2xxx/CVE-2020-2691.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2692.json b/2020/2xxx/CVE-2020-2692.json index ca34ee101b2..8e71be0f25c 100644 --- a/2020/2xxx/CVE-2020-2692.json +++ b/2020/2xxx/CVE-2020-2692.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2693.json b/2020/2xxx/CVE-2020-2693.json index c5eb10feaa6..925a4d88b5a 100644 --- a/2020/2xxx/CVE-2020-2693.json +++ b/2020/2xxx/CVE-2020-2693.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2701.json b/2020/2xxx/CVE-2020-2701.json index 086e29e621e..fd826d05de2 100644 --- a/2020/2xxx/CVE-2020-2701.json +++ b/2020/2xxx/CVE-2020-2701.json @@ -77,6 +77,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-550/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-550/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2702.json b/2020/2xxx/CVE-2020-2702.json index 4c53961d839..08f5d16aaa0 100644 --- a/2020/2xxx/CVE-2020-2702.json +++ b/2020/2xxx/CVE-2020-2702.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2703.json b/2020/2xxx/CVE-2020-2703.json index 94b8e6cc9dd..90e46f21368 100644 --- a/2020/2xxx/CVE-2020-2703.json +++ b/2020/2xxx/CVE-2020-2703.json @@ -73,6 +73,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2705.json b/2020/2xxx/CVE-2020-2705.json index e20fb9decac..81ad88ca82d 100644 --- a/2020/2xxx/CVE-2020-2705.json +++ b/2020/2xxx/CVE-2020-2705.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2725.json b/2020/2xxx/CVE-2020-2725.json index 4f6efdb93b8..61bd979476a 100644 --- a/2020/2xxx/CVE-2020-2725.json +++ b/2020/2xxx/CVE-2020-2725.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2726.json b/2020/2xxx/CVE-2020-2726.json index ad4bc1dbc29..6f731b5a1af 100644 --- a/2020/2xxx/CVE-2020-2726.json +++ b/2020/2xxx/CVE-2020-2726.json @@ -77,6 +77,11 @@ "refsource": "GENTOO", "name": "GLSA-202004-02", "url": "https://security.gentoo.org/glsa/202004-02" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2741.json b/2020/2xxx/CVE-2020-2741.json index 357c054b3e9..1d49d1ae5c2 100644 --- a/2020/2xxx/CVE-2020-2741.json +++ b/2020/2xxx/CVE-2020-2741.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2742.json b/2020/2xxx/CVE-2020-2742.json index 50c01dc8708..40bffc0e239 100644 --- a/2020/2xxx/CVE-2020-2742.json +++ b/2020/2xxx/CVE-2020-2742.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2743.json b/2020/2xxx/CVE-2020-2743.json index 6e54544d8bd..373f958414d 100644 --- a/2020/2xxx/CVE-2020-2743.json +++ b/2020/2xxx/CVE-2020-2743.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2758.json b/2020/2xxx/CVE-2020-2758.json index 93bf0c7ca77..310b1741987 100644 --- a/2020/2xxx/CVE-2020-2758.json +++ b/2020/2xxx/CVE-2020-2758.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2902.json b/2020/2xxx/CVE-2020-2902.json index 2b9905dec0e..c9e93c8b785 100644 --- a/2020/2xxx/CVE-2020-2902.json +++ b/2020/2xxx/CVE-2020-2902.json @@ -82,6 +82,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2905.json b/2020/2xxx/CVE-2020-2905.json index b4f5a9c310f..5e2d1dc9bc0 100644 --- a/2020/2xxx/CVE-2020-2905.json +++ b/2020/2xxx/CVE-2020-2905.json @@ -77,6 +77,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2907.json b/2020/2xxx/CVE-2020-2907.json index 06061f6ef0e..62930d7e245 100644 --- a/2020/2xxx/CVE-2020-2907.json +++ b/2020/2xxx/CVE-2020-2907.json @@ -87,6 +87,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2910.json b/2020/2xxx/CVE-2020-2910.json index fbd3f204df8..d819f527db1 100644 --- a/2020/2xxx/CVE-2020-2910.json +++ b/2020/2xxx/CVE-2020-2910.json @@ -73,6 +73,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2914.json b/2020/2xxx/CVE-2020-2914.json index 44214f3e76c..695d544dd2e 100644 --- a/2020/2xxx/CVE-2020-2914.json +++ b/2020/2xxx/CVE-2020-2914.json @@ -73,6 +73,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2951.json b/2020/2xxx/CVE-2020-2951.json index 8154ffad826..4c4e5d2ab86 100644 --- a/2020/2xxx/CVE-2020-2951.json +++ b/2020/2xxx/CVE-2020-2951.json @@ -77,6 +77,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/2xxx/CVE-2020-2958.json b/2020/2xxx/CVE-2020-2958.json index aba6dff09c3..0fbb0e09259 100644 --- a/2020/2xxx/CVE-2020-2958.json +++ b/2020/2xxx/CVE-2020-2958.json @@ -77,6 +77,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0925", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202101-09", + "url": "https://security.gentoo.org/glsa/202101-09" } ] } diff --git a/2020/36xxx/CVE-2020-36190.json b/2020/36xxx/CVE-2020-36190.json new file mode 100644 index 00000000000..2af47260e4d --- /dev/null +++ b/2020/36xxx/CVE-2020-36190.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36190", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sferik/rails_admin/blob/master/README.md", + "refsource": "MISC", + "name": "https://github.com/sferik/rails_admin/blob/master/README.md" + }, + { + "url": "https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375", + "refsource": "MISC", + "name": "https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375" + }, + { + "url": "https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3", + "refsource": "MISC", + "name": "https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3" + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4079.json b/2020/4xxx/CVE-2020-4079.json index 15a8fcf4895..993279237fa 100644 --- a/2020/4xxx/CVE-2020-4079.json +++ b/2020/4xxx/CVE-2020-4079.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 2.8.0, when the ajax endpoint for the \"excel export\" portal functionality is called directly it allows getting data without scope filtering. This allows a user to access data they which they should not have access to.\n\nThis is fixed in versions 2.7.2 and 3.0.0." + "value": "Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 2.8.0, when the ajax endpoint for the \"excel export\" portal functionality is called directly it allows getting data without scope filtering. This allows a user to access data they which they should not have access to. This is fixed in versions 2.7.2 and 3.0.0." } ] }, diff --git a/2021/1xxx/CVE-2021-1636.json b/2021/1xxx/CVE-2021-1636.json index 84785013381..ef3c67d4c86 100644 --- a/2021/1xxx/CVE-2021-1636.json +++ b/2021/1xxx/CVE-2021-1636.json @@ -1,163 +1,165 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-1636", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft SQL Server", - "version": { - "version_data": [ - { - "version_value": "2012 for 32-bit Systems Service Pack 4 (QFE)" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1636", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SQL Server", + "version": { + "version_data": [ + { + "version_value": "2012 for 32-bit Systems Service Pack 4 (QFE)" + }, + { + "version_value": "2012 for x64-based Systems Service Pack 4 (QFE)" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2017 for x64-based Systems (GDR)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2017 for x64-based Systems (CU 22)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2016 Service Pack 2 for x64-based Systems (CU 15)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2019 for x64-based Systems (CU 8)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft SQL Server 2019 for x64-based Systems (GDR)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2012 for x64-based Systems Service Pack 4 (QFE)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft SQL Server 2017 for x64-based Systems (GDR)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2017 for x64-based Systems (CU 22)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2016 Service Pack 2 for x64-based Systems (CU 15)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2019 for x64-based Systems (CU 8)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft SQL Server 2019 for x64-based Systems (GDR)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft SQL Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SQL Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1637.json b/2021/1xxx/CVE-2021-1637.json index 50d81cfa783..c5b401c9d6c 100644 --- a/2021/1xxx/CVE-2021-1637.json +++ b/2021/1xxx/CVE-2021-1637.json @@ -1,241 +1,243 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-1637", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1637", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Query Information Disclosure Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Disclosure" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Query Information Disclosure Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1638.json b/2021/1xxx/CVE-2021-1638.json index a2769f1ec53..1c97b001b23 100644 --- a/2021/1xxx/CVE-2021-1638.json +++ b/2021/1xxx/CVE-2021-1638.json @@ -1,208 +1,210 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-1638", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1638", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Bluetooth Security Feature Bypass Vulnerability This CVE ID is unique from CVE-2021-1683, CVE-2021-1684." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Security Feature Bypass" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Bluetooth Security Feature Bypass Vulnerability This CVE ID is unique from CVE-2021-1683, CVE-2021-1684." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security Feature Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1641.json b/2021/1xxx/CVE-2021-1641.json index 282a7feaebe..dd6fcabb3ce 100644 --- a/2021/1xxx/CVE-2021-1641.json +++ b/2021/1xxx/CVE-2021-1641.json @@ -1,80 +1,82 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-1641", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft SharePoint Enterprise Server", - "version": { - "version_data": [ - { - "version_value": "2016" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1641", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SharePoint Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "2016" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Foundation", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Server", + "version": { + "version_data": [ + { + "version_value": "2019" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft SharePoint Foundation", - "version": { - "version_data": [ - { - "version_value": "2013 Service Pack 1" - } - ] - } - }, - { - "product_name": "Microsoft SharePoint Server", - "version": { - "version_data": [ - { - "version_value": "2019" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-1717." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Spoofing" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-1717." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3135.json b/2021/3xxx/CVE-2021-3135.json new file mode 100644 index 00000000000..25d4e1e375a --- /dev/null +++ b/2021/3xxx/CVE-2021-3135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file