From c49d7edc1ed36a675d4c55ed68d6b65f3f5f874b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 17 Dec 2020 17:01:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/15xxx/CVE-2020-15292.json | 5 +++-- 2020/15xxx/CVE-2020-15293.json | 5 +++-- 2020/15xxx/CVE-2020-15294.json | 7 ++++--- 2021/20xxx/CVE-2021-20001.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20002.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20003.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20004.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20005.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20006.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20007.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20008.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20009.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20010.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20011.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20012.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20013.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20014.json | 18 ++++++++++++++++++ 2021/20xxx/CVE-2021-20015.json | 18 ++++++++++++++++++ 18 files changed, 280 insertions(+), 7 deletions(-) create mode 100644 2021/20xxx/CVE-2021-20001.json create mode 100644 2021/20xxx/CVE-2021-20002.json create mode 100644 2021/20xxx/CVE-2021-20003.json create mode 100644 2021/20xxx/CVE-2021-20004.json create mode 100644 2021/20xxx/CVE-2021-20005.json create mode 100644 2021/20xxx/CVE-2021-20006.json create mode 100644 2021/20xxx/CVE-2021-20007.json create mode 100644 2021/20xxx/CVE-2021-20008.json create mode 100644 2021/20xxx/CVE-2021-20009.json create mode 100644 2021/20xxx/CVE-2021-20010.json create mode 100644 2021/20xxx/CVE-2021-20011.json create mode 100644 2021/20xxx/CVE-2021-20012.json create mode 100644 2021/20xxx/CVE-2021-20013.json create mode 100644 2021/20xxx/CVE-2021-20014.json create mode 100644 2021/20xxx/CVE-2021-20015.json diff --git a/2020/15xxx/CVE-2020-15292.json b/2020/15xxx/CVE-2020-15292.json index 5ec8b1dd537..7cdff65e473 100644 --- a/2020/15xxx/CVE-2020-15292.json +++ b/2020/15xxx/CVE-2020-15292.json @@ -81,8 +81,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.bitdefender.com/support/security-advisories/lack-validation-data-read-guest-memory-bitdefender-hvi-va-9333/" + "refsource": "MISC", + "url": "https://www.bitdefender.com/support/security-advisories/lack-validation-data-read-guest-memory-bitdefender-hvi-va-9333/", + "name": "https://www.bitdefender.com/support/security-advisories/lack-validation-data-read-guest-memory-bitdefender-hvi-va-9333/" } ] }, diff --git a/2020/15xxx/CVE-2020-15293.json b/2020/15xxx/CVE-2020-15293.json index 13314ebcf1e..29badb124bf 100644 --- a/2020/15xxx/CVE-2020-15293.json +++ b/2020/15xxx/CVE-2020-15293.json @@ -81,8 +81,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.bitdefender.com/support/security-advisories/memory-corruption-bitdefender-hypervisor-introspection-va-9336/" + "refsource": "MISC", + "url": "https://www.bitdefender.com/support/security-advisories/memory-corruption-bitdefender-hypervisor-introspection-va-9336/", + "name": "https://www.bitdefender.com/support/security-advisories/memory-corruption-bitdefender-hypervisor-introspection-va-9336/" } ] }, diff --git a/2020/15xxx/CVE-2020-15294.json b/2020/15xxx/CVE-2020-15294.json index a9f77c80d07..8de31873ec8 100644 --- a/2020/15xxx/CVE-2020-15294.json +++ b/2020/15xxx/CVE-2020-15294.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "Compiler Optimization Removal or Modification of Security-critical Code vulnerability in IntPeParseUnwindData() results in multiple dereferences to the same pointer. If the pointer is located in memory-mapped from the guest space, this may cause a race-condition where the generated code would dereference the same address twice, thus obtaining different values, which may lead to arbitrary code execution.\nThis issue affects:\nBitdefender Hypervisor Introspection\nversions prior to 1.132.2." + "value": "Compiler Optimization Removal or Modification of Security-critical Code vulnerability in IntPeParseUnwindData() results in multiple dereferences to the same pointer. If the pointer is located in memory-mapped from the guest space, this may cause a race-condition where the generated code would dereference the same address twice, thus obtaining different values, which may lead to arbitrary code execution. This issue affects: Bitdefender Hypervisor Introspection versions prior to 1.132.2." } ] }, @@ -81,8 +81,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.bitdefender.com/support/security-advisories/compiler-optimization-removal-modification-security-critical-code-vulnerability-bitdefender-hypervisor-introspection-va-9339/" + "refsource": "MISC", + "url": "https://www.bitdefender.com/support/security-advisories/compiler-optimization-removal-modification-security-critical-code-vulnerability-bitdefender-hypervisor-introspection-va-9339/", + "name": "https://www.bitdefender.com/support/security-advisories/compiler-optimization-removal-modification-security-critical-code-vulnerability-bitdefender-hypervisor-introspection-va-9339/" } ] }, diff --git a/2021/20xxx/CVE-2021-20001.json b/2021/20xxx/CVE-2021-20001.json new file mode 100644 index 00000000000..9d7bdd9698e --- /dev/null +++ b/2021/20xxx/CVE-2021-20001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20002.json b/2021/20xxx/CVE-2021-20002.json new file mode 100644 index 00000000000..ce8e2f18f3c --- /dev/null +++ b/2021/20xxx/CVE-2021-20002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20003.json b/2021/20xxx/CVE-2021-20003.json new file mode 100644 index 00000000000..e44b1c4ce8d --- /dev/null +++ b/2021/20xxx/CVE-2021-20003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20004.json b/2021/20xxx/CVE-2021-20004.json new file mode 100644 index 00000000000..58320ac78ac --- /dev/null +++ b/2021/20xxx/CVE-2021-20004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20005.json b/2021/20xxx/CVE-2021-20005.json new file mode 100644 index 00000000000..d07215b986a --- /dev/null +++ b/2021/20xxx/CVE-2021-20005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20006.json b/2021/20xxx/CVE-2021-20006.json new file mode 100644 index 00000000000..1c2efba8a16 --- /dev/null +++ b/2021/20xxx/CVE-2021-20006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20007.json b/2021/20xxx/CVE-2021-20007.json new file mode 100644 index 00000000000..ebd9a079c9a --- /dev/null +++ b/2021/20xxx/CVE-2021-20007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20008.json b/2021/20xxx/CVE-2021-20008.json new file mode 100644 index 00000000000..12129cd91b7 --- /dev/null +++ b/2021/20xxx/CVE-2021-20008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20009.json b/2021/20xxx/CVE-2021-20009.json new file mode 100644 index 00000000000..01852696808 --- /dev/null +++ b/2021/20xxx/CVE-2021-20009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20010.json b/2021/20xxx/CVE-2021-20010.json new file mode 100644 index 00000000000..964fd53e178 --- /dev/null +++ b/2021/20xxx/CVE-2021-20010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20011.json b/2021/20xxx/CVE-2021-20011.json new file mode 100644 index 00000000000..45de4ff281b --- /dev/null +++ b/2021/20xxx/CVE-2021-20011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20012.json b/2021/20xxx/CVE-2021-20012.json new file mode 100644 index 00000000000..b576b9d7ccf --- /dev/null +++ b/2021/20xxx/CVE-2021-20012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20013.json b/2021/20xxx/CVE-2021-20013.json new file mode 100644 index 00000000000..be076a0600e --- /dev/null +++ b/2021/20xxx/CVE-2021-20013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20014.json b/2021/20xxx/CVE-2021-20014.json new file mode 100644 index 00000000000..929197889a3 --- /dev/null +++ b/2021/20xxx/CVE-2021-20014.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20014", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20015.json b/2021/20xxx/CVE-2021-20015.json new file mode 100644 index 00000000000..870d6cb6ed5 --- /dev/null +++ b/2021/20xxx/CVE-2021-20015.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20015", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file