From cf9aaebfbd25ac0f83a8d5b739242a7dd3f122ab Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 25 Jan 2022 01:01:06 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/44xxx/CVE-2021-44988.json | 66 ++++++++++++++++++++++++++++++---- 2021/44xxx/CVE-2021-44992.json | 61 +++++++++++++++++++++++++++---- 2021/44xxx/CVE-2021-44993.json | 61 +++++++++++++++++++++++++++---- 2021/44xxx/CVE-2021-44994.json | 66 ++++++++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46474.json | 56 +++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46475.json | 56 +++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46477.json | 56 +++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46478.json | 56 +++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46480.json | 56 +++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46481.json | 56 +++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46482.json | 56 +++++++++++++++++++++++++---- 2021/46xxx/CVE-2021-46483.json | 56 +++++++++++++++++++++++++---- 12 files changed, 630 insertions(+), 72 deletions(-) diff --git a/2021/44xxx/CVE-2021-44988.json b/2021/44xxx/CVE-2021-44988.json index 7b4315f4f49..c04a70fd56f 100644 --- a/2021/44xxx/CVE-2021-44988.json +++ b/2021/44xxx/CVE-2021-44988.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44988", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44988", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security.samsungmobile.com/securityUpdate.smsb", + "refsource": "MISC", + "name": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/4890", + "refsource": "MISC", + "name": "https://github.com/jerryscript-project/jerryscript/issues/4890" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/4891", + "refsource": "MISC", + "name": "https://github.com/jerryscript-project/jerryscript/issues/4891" } ] } diff --git a/2021/44xxx/CVE-2021-44992.json b/2021/44xxx/CVE-2021-44992.json index dfe60251d72..a9ad7761420 100644 --- a/2021/44xxx/CVE-2021-44992.json +++ b/2021/44xxx/CVE-2021-44992.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44992", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44992", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security.samsungmobile.com/securityUpdate.smsb", + "refsource": "MISC", + "name": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/4875", + "refsource": "MISC", + "name": "https://github.com/jerryscript-project/jerryscript/issues/4875" } ] } diff --git a/2021/44xxx/CVE-2021-44993.json b/2021/44xxx/CVE-2021-44993.json index 1507ef3dc7b..14073c18709 100644 --- a/2021/44xxx/CVE-2021-44993.json +++ b/2021/44xxx/CVE-2021-44993.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44993", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44993", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security.samsungmobile.com/securityUpdate.smsb", + "refsource": "MISC", + "name": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/4876", + "refsource": "MISC", + "name": "https://github.com/jerryscript-project/jerryscript/issues/4876" } ] } diff --git a/2021/44xxx/CVE-2021-44994.json b/2021/44xxx/CVE-2021-44994.json index a8bf6309baf..cf751feccc4 100644 --- a/2021/44xxx/CVE-2021-44994.json +++ b/2021/44xxx/CVE-2021-44994.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44994", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44994", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security.samsungmobile.com/securityUpdate.smsb", + "refsource": "MISC", + "name": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/4894", + "refsource": "MISC", + "name": "https://github.com/jerryscript-project/jerryscript/issues/4894" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/4895", + "refsource": "MISC", + "name": "https://github.com/jerryscript-project/jerryscript/issues/4895" } ] } diff --git a/2021/46xxx/CVE-2021-46474.json b/2021/46xxx/CVE-2021-46474.json index 23508072ed8..d928acbafba 100644 --- a/2021/46xxx/CVE-2021-46474.json +++ b/2021/46xxx/CVE-2021-46474.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46474", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46474", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiEvalCodeSub in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/57", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/57" } ] } diff --git a/2021/46xxx/CVE-2021-46475.json b/2021/46xxx/CVE-2021-46475.json index 72bac3ee23a..8e0719acf16 100644 --- a/2021/46xxx/CVE-2021-46475.json +++ b/2021/46xxx/CVE-2021-46475.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46475", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46475", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsi_ArraySliceCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/64", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/64" } ] } diff --git a/2021/46xxx/CVE-2021-46477.json b/2021/46xxx/CVE-2021-46477.json index e61d3b82d08..7ae63d9decf 100644 --- a/2021/46xxx/CVE-2021-46477.json +++ b/2021/46xxx/CVE-2021-46477.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46477", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46477", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/63", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/63" } ] } diff --git a/2021/46xxx/CVE-2021-46478.json b/2021/46xxx/CVE-2021-46478.json index a2cf4a6a1ae..e6ce6a4c3ba 100644 --- a/2021/46xxx/CVE-2021-46478.json +++ b/2021/46xxx/CVE-2021-46478.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46478", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46478", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/60", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/60" } ] } diff --git a/2021/46xxx/CVE-2021-46480.json b/2021/46xxx/CVE-2021-46480.json index 2b6a9a23055..bbd27953c14 100644 --- a/2021/46xxx/CVE-2021-46480.json +++ b/2021/46xxx/CVE-2021-46480.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46480", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46480", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/61", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/61" } ] } diff --git a/2021/46xxx/CVE-2021-46481.json b/2021/46xxx/CVE-2021-46481.json index c5b09b47687..4b19eb9f0dd 100644 --- a/2021/46xxx/CVE-2021-46481.json +++ b/2021/46xxx/CVE-2021-46481.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46481", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46481", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a memory leak via linenoise at src/linenoise.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/55", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/55" } ] } diff --git a/2021/46xxx/CVE-2021-46482.json b/2021/46xxx/CVE-2021-46482.json index 62740983f85..ca3c762b321 100644 --- a/2021/46xxx/CVE-2021-46482.json +++ b/2021/46xxx/CVE-2021-46482.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46482", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46482", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/66", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/66" } ] } diff --git a/2021/46xxx/CVE-2021-46483.json b/2021/46xxx/CVE-2021-46483.json index a1bebf7c794..34212afac76 100644 --- a/2021/46xxx/CVE-2021-46483.json +++ b/2021/46xxx/CVE-2021-46483.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-46483", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-46483", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jsish v3.5.0 was discovered to contain a heap buffer overflow via BooleanConstructor at src/jsiBool.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pcmacdon/jsish/issues/62", + "refsource": "MISC", + "name": "https://github.com/pcmacdon/jsish/issues/62" } ] }