diff --git a/2021/21xxx/CVE-2021-21227.json b/2021/21xxx/CVE-2021-21227.json index 96899766805..8a6191cad87 100644 --- a/2021/21xxx/CVE-2021-21227.json +++ b/2021/21xxx/CVE-2021-21227.json @@ -59,6 +59,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-08", "url": "https://security.gentoo.org/glsa/202104-08" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4911", + "url": "https://www.debian.org/security/2021/dsa-4911" } ] }, diff --git a/2021/21xxx/CVE-2021-21228.json b/2021/21xxx/CVE-2021-21228.json index 9bdb1ad5225..4eeace9c026 100644 --- a/2021/21xxx/CVE-2021-21228.json +++ b/2021/21xxx/CVE-2021-21228.json @@ -59,6 +59,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-08", "url": "https://security.gentoo.org/glsa/202104-08" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4911", + "url": "https://www.debian.org/security/2021/dsa-4911" } ] }, diff --git a/2021/21xxx/CVE-2021-21229.json b/2021/21xxx/CVE-2021-21229.json index bf3c5e81a0d..77ac0d51126 100644 --- a/2021/21xxx/CVE-2021-21229.json +++ b/2021/21xxx/CVE-2021-21229.json @@ -59,6 +59,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-08", "url": "https://security.gentoo.org/glsa/202104-08" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4911", + "url": "https://www.debian.org/security/2021/dsa-4911" } ] }, diff --git a/2021/21xxx/CVE-2021-21230.json b/2021/21xxx/CVE-2021-21230.json index b94edaaf644..43dea05a798 100644 --- a/2021/21xxx/CVE-2021-21230.json +++ b/2021/21xxx/CVE-2021-21230.json @@ -59,6 +59,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-08", "url": "https://security.gentoo.org/glsa/202104-08" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4911", + "url": "https://www.debian.org/security/2021/dsa-4911" } ] }, diff --git a/2021/21xxx/CVE-2021-21231.json b/2021/21xxx/CVE-2021-21231.json index 599a5e1030c..2cc209f25de 100644 --- a/2021/21xxx/CVE-2021-21231.json +++ b/2021/21xxx/CVE-2021-21231.json @@ -59,6 +59,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-08", "url": "https://security.gentoo.org/glsa/202104-08" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4911", + "url": "https://www.debian.org/security/2021/dsa-4911" } ] }, diff --git a/2021/21xxx/CVE-2021-21232.json b/2021/21xxx/CVE-2021-21232.json index f591de566ea..62bc72331c7 100644 --- a/2021/21xxx/CVE-2021-21232.json +++ b/2021/21xxx/CVE-2021-21232.json @@ -59,6 +59,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-08", "url": "https://security.gentoo.org/glsa/202104-08" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4911", + "url": "https://www.debian.org/security/2021/dsa-4911" } ] }, diff --git a/2021/21xxx/CVE-2021-21233.json b/2021/21xxx/CVE-2021-21233.json index b7de7f94c63..1ca566a4f78 100644 --- a/2021/21xxx/CVE-2021-21233.json +++ b/2021/21xxx/CVE-2021-21233.json @@ -59,6 +59,11 @@ "refsource": "GENTOO", "name": "GLSA-202104-08", "url": "https://security.gentoo.org/glsa/202104-08" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4911", + "url": "https://www.debian.org/security/2021/dsa-4911" } ] }, diff --git a/2021/22xxx/CVE-2021-22187.json b/2021/22xxx/CVE-2021-22187.json index f960623cde1..2951a1b1bcb 100644 --- a/2021/22xxx/CVE-2021-22187.json +++ b/2021/22xxx/CVE-2021-22187.json @@ -19,7 +19,13 @@ "version": { "version_data": [ { - "version_value": "<=X.Y" + "version_value": "<13.6.7" + }, + { + "version_value": ">=13.7, <13.7.7" + }, + { + "version_value": ">=13.8, <13.8.4" } ] } @@ -60,7 +66,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 12.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted." + "value": "An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 13.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted." } ] }, diff --git a/2021/22xxx/CVE-2021-22198.json b/2021/22xxx/CVE-2021-22198.json index 4bb511239bb..1b482484f75 100644 --- a/2021/22xxx/CVE-2021-22198.json +++ b/2021/22xxx/CVE-2021-22198.json @@ -19,7 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=13.8" + "version_value": ">=13.8, <13.8.7" + }, + { + "version_value": ">=13.9, <13.9.5" + }, + { + "version_value": ">=13.10, <13.10.1" } ] } diff --git a/2021/22xxx/CVE-2021-22200.json b/2021/22xxx/CVE-2021-22200.json index c6a085d8056..ef8cf461574 100644 --- a/2021/22xxx/CVE-2021-22200.json +++ b/2021/22xxx/CVE-2021-22200.json @@ -19,7 +19,13 @@ "version": { "version_data": [ { - "version_value": ">=12.6" + "version_value": ">=12.6, <13.8.7" + }, + { + "version_value": ">=13.9, <13.9.5" + }, + { + "version_value": ">=13.10, <13.10.1" } ] } diff --git a/2021/29xxx/CVE-2021-29240.json b/2021/29xxx/CVE-2021-29240.json index 559b7425fe1..1fb379c5e4e 100644 --- a/2021/29xxx/CVE-2021-29240.json +++ b/2021/29xxx/CVE-2021-29240.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29240", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-29240", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://customers.codesys.com/index.php", + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php" + }, + { + "refsource": "MISC", + "name": "https://www.codesys.com/security/security-reports.html", + "url": "https://www.codesys.com/security/security-reports.html" + }, + { + "refsource": "MISC", + "name": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14636&token=1ce7e6e4cbe4651989ede418450d7c82e972bdf2&download=", + "url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14636&token=1ce7e6e4cbe4651989ede418450d7c82e972bdf2&download=" } ] }