diff --git a/2021/22xxx/CVE-2021-22567.json b/2021/22xxx/CVE-2021-22567.json index 4d2f987d208..bce6df5633e 100644 --- a/2021/22xxx/CVE-2021-22567.json +++ b/2021/22xxx/CVE-2021-22567.json @@ -1,90 +1,92 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@google.com", - "DATE_PUBLIC": "2021-11-16T23:00:00.000Z", - "ID": "CVE-2021-22567", - "STATE": "PUBLIC", - "TITLE": "Bidirectional Override in Dart SDK" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Dart SDK", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "2.15.0-268.18.beta" - } - ] - } - } - ] - }, - "vendor_name": "Google LLC" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Bidirectional Unicode text can be interpreted and compiled differently than how it appears in editors which can be exploited to get nefarious code passed a code review by appearing benign. An attacker could embed a source that is invisible to a code reviewer that modifies the behavior of a program in unexpected ways." - } - ] - }, - "generator": { - "engine": "Vulnogram 0.0.9" - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "LOW", - "baseScore": 4.6, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", - "version": "3.1" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-284 Improper Access Control" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://github.com/dart-lang/sdk/blob/main/CHANGELOG.md" - }, - { - "refsource": "CONFIRM", - "url": "https://github.com/dart-lang/sdk/commit/52519ea8eb4780c468c4c2ed00e7c8046ccfed41" - } - ] - }, - "source": { - "discovery": "INTERNAL" - } -} + "CVE_data_meta": { + "ASSIGNER": "security@google.com", + "DATE_PUBLIC": "2021-11-16T23:00:00.000Z", + "ID": "CVE-2021-22567", + "STATE": "PUBLIC", + "TITLE": "Bidirectional Override in Dart SDK" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Dart SDK", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2.15.0-268.18.beta" + } + ] + } + } + ] + }, + "vendor_name": "Google LLC" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Bidirectional Unicode text can be interpreted and compiled differently than how it appears in editors which can be exploited to get nefarious code passed a code review by appearing benign. An attacker could embed a source that is invisible to a code reviewer that modifies the behavior of a program in unexpected ways." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://github.com/dart-lang/sdk/blob/main/CHANGELOG.md", + "name": "https://github.com/dart-lang/sdk/blob/main/CHANGELOG.md" + }, + { + "refsource": "MISC", + "url": "https://github.com/dart-lang/sdk/commit/52519ea8eb4780c468c4c2ed00e7c8046ccfed41", + "name": "https://github.com/dart-lang/sdk/commit/52519ea8eb4780c468c4c2ed00e7c8046ccfed41" + } + ] + }, + "source": { + "discovery": "INTERNAL" + } +} \ No newline at end of file diff --git a/2021/44xxx/CVE-2021-44224.json b/2021/44xxx/CVE-2021-44224.json index 0a36ca0d04f..3c845de1611 100644 --- a/2021/44xxx/CVE-2021-44224.json +++ b/2021/44xxx/CVE-2021-44224.json @@ -97,6 +97,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20211224-0001/", "url": "https://security.netapp.com/advisory/ntap-20211224-0001/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5035", + "url": "https://www.debian.org/security/2022/dsa-5035" } ] }, diff --git a/2021/44xxx/CVE-2021-44790.json b/2021/44xxx/CVE-2021-44790.json index 20bc78430c9..34d3fba1e2a 100644 --- a/2021/44xxx/CVE-2021-44790.json +++ b/2021/44xxx/CVE-2021-44790.json @@ -92,6 +92,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20211224-0001/", "url": "https://security.netapp.com/advisory/ntap-20211224-0001/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5035", + "url": "https://www.debian.org/security/2022/dsa-5035" } ] },