From fabf8a1062775bd0ccf782373340a8ecb92f15ef Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 16 Jul 2021 17:01:05 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/24xxx/CVE-2020-24700.json | 5 + 2020/24xxx/CVE-2020-24701.json | 5 + 2020/4xxx/CVE-2020-4675.json | 174 +++++++++++++-------------- 2020/4xxx/CVE-2020-4821.json | 208 ++++++++++++++++----------------- 2020/4xxx/CVE-2020-4980.json | 180 ++++++++++++++-------------- 2021/22xxx/CVE-2021-22000.json | 5 + 2021/22xxx/CVE-2021-22555.json | 5 + 2021/25xxx/CVE-2021-25155.json | 10 ++ 2021/25xxx/CVE-2021-25156.json | 5 + 2021/25xxx/CVE-2021-25157.json | 5 + 2021/25xxx/CVE-2021-25158.json | 5 + 2021/25xxx/CVE-2021-25159.json | 5 + 2021/25xxx/CVE-2021-25160.json | 5 + 2021/25xxx/CVE-2021-25161.json | 5 + 2021/25xxx/CVE-2021-25162.json | 5 + 2021/36xxx/CVE-2021-36760.json | 18 +++ 2021/36xxx/CVE-2021-36761.json | 18 +++ 2021/36xxx/CVE-2021-36762.json | 18 +++ 2021/36xxx/CVE-2021-36763.json | 18 +++ 2021/36xxx/CVE-2021-36764.json | 18 +++ 2021/36xxx/CVE-2021-36765.json | 18 +++ 2021/36xxx/CVE-2021-36766.json | 18 +++ 22 files changed, 472 insertions(+), 281 deletions(-) create mode 100644 2021/36xxx/CVE-2021-36760.json create mode 100644 2021/36xxx/CVE-2021-36761.json create mode 100644 2021/36xxx/CVE-2021-36762.json create mode 100644 2021/36xxx/CVE-2021-36763.json create mode 100644 2021/36xxx/CVE-2021-36764.json create mode 100644 2021/36xxx/CVE-2021-36765.json create mode 100644 2021/36xxx/CVE-2021-36766.json diff --git a/2020/24xxx/CVE-2020-24700.json b/2020/24xxx/CVE-2020-24700.json index a0d4ef9e3ba..3303b6efc0b 100644 --- a/2020/24xxx/CVE-2020-24700.json +++ b/2020/24xxx/CVE-2020-24700.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20210716 Open-Xchange Security Advisory 2021-07-15", "url": "http://seclists.org/fulldisclosure/2021/Jul/33" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html" } ] } diff --git a/2020/24xxx/CVE-2020-24701.json b/2020/24xxx/CVE-2020-24701.json index 66000294dab..79345fa6254 100644 --- a/2020/24xxx/CVE-2020-24701.json +++ b/2020/24xxx/CVE-2020-24701.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20210716 Open-Xchange Security Advisory 2021-07-15", "url": "http://seclists.org/fulldisclosure/2021/Jul/33" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html" } ] } diff --git a/2020/4xxx/CVE-2020-4675.json b/2020/4xxx/CVE-2020-4675.json index b634ea765d9..1e305b8d948 100644 --- a/2020/4xxx/CVE-2020-4675.json +++ b/2020/4xxx/CVE-2020-4675.json @@ -1,90 +1,90 @@ { - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Gain Access" - } - ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - }, - "BM" : { - "UI" : "R", - "I" : "H", - "S" : "U", - "AV" : "N", - "PR" : "N", - "C" : "N", - "A" : "N", - "SCORE" : "6.500", - "AC" : "L" - } - } - }, - "CVE_data_meta" : { - "ID" : "CVE-2020-4675", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-07-15T00:00:00" - }, - "data_version" : "4.0", - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6472927", - "title" : "IBM Security Bulletin 6472927 (InfoSphere Master Data Management)", - "url" : "https://www.ibm.com/support/pages/node/6472927" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/186324", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-infosphere-cve20204675-csrf (186324)", - "refsource" : "XF" - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM InfoSphere Master Data Management Server 11.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186324.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "11.6" - } - ] - }, - "product_name" : "InfoSphere Master Data Management" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "lang": "eng", + "value": "Gain Access" + } + ] } - ] - } - }, - "data_format" : "MITRE" -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "UI": "R", + "I": "H", + "S": "U", + "AV": "N", + "PR": "N", + "C": "N", + "A": "N", + "SCORE": "6.500", + "AC": "L" + } + } + }, + "CVE_data_meta": { + "ID": "CVE-2020-4675", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-07-15T00:00:00" + }, + "data_version": "4.0", + "data_type": "CVE", + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6472927", + "title": "IBM Security Bulletin 6472927 (InfoSphere Master Data Management)", + "url": "https://www.ibm.com/support/pages/node/6472927" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/186324", + "title": "X-Force Vulnerability Report", + "name": "ibm-infosphere-cve20204675-csrf (186324)", + "refsource": "XF" + } + ] + }, + "description": { + "description_data": [ + { + "value": "IBM InfoSphere Master Data Management Server 11.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186324.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "11.6" + } + ] + }, + "product_name": "InfoSphere Master Data Management" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4821.json b/2020/4xxx/CVE-2020-4821.json index b86e7ccb084..6185eab39d1 100644 --- a/2020/4xxx/CVE-2020-4821.json +++ b/2020/4xxx/CVE-2020-4821.json @@ -1,106 +1,106 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "InfoSphere Change Data Capture for z/OS", - "version" : { - "version_data" : [ - { - "version_value" : "10.2.1" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "11.4" - } - ] - }, - "product_name" : "InfoSphere Data Replication" - } - ] - }, - "vendor_name" : "IBM" - } - ] - } - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM InfoSphere Data Replication 11.4 and IBM InfoSphere Change Data Capture for z/OS 10.2.1, under certain configurations, could allow a user to bypass authentication mechanisms using an empty password string. IBM X-Force ID: 189834" - } - ] - }, - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6472911 (InfoSphere Change Data Capture for z/OS)", - "url" : "https://www.ibm.com/support/pages/node/6472911", - "name" : "https://www.ibm.com/support/pages/node/6472911", - "refsource" : "CONFIRM" - }, - { - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6472909", - "title" : "IBM Security Bulletin 6472909 (InfoSphere Data Replication)", - "url" : "https://www.ibm.com/support/pages/node/6472909" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/189834", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "name" : "ibm-cognos-cve20204821-sec-bypass (189834)" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Bypass Security" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "InfoSphere Change Data Capture for z/OS", + "version": { + "version_data": [ + { + "version_value": "10.2.1" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "11.4" + } + ] + }, + "product_name": "InfoSphere Data Replication" + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "SCORE" : "5.900", - "AC" : "H", - "A" : "N", - "C" : "H", - "S" : "U", - "AV" : "N", - "PR" : "N", - "UI" : "N", - "I" : "N" - } - } - }, - "CVE_data_meta" : { - "ID" : "CVE-2020-4821", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2021-07-15T00:00:00" - }, - "data_version" : "4.0" -} + } + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM InfoSphere Data Replication 11.4 and IBM InfoSphere Change Data Capture for z/OS 10.2.1, under certain configurations, could allow a user to bypass authentication mechanisms using an empty password string. IBM X-Force ID: 189834" + } + ] + }, + "data_type": "CVE", + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6472911 (InfoSphere Change Data Capture for z/OS)", + "url": "https://www.ibm.com/support/pages/node/6472911", + "name": "https://www.ibm.com/support/pages/node/6472911", + "refsource": "CONFIRM" + }, + { + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6472909", + "title": "IBM Security Bulletin 6472909 (InfoSphere Data Replication)", + "url": "https://www.ibm.com/support/pages/node/6472909" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189834", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "name": "ibm-cognos-cve20204821-sec-bypass (189834)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Bypass Security" + } + ] + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "SCORE": "5.900", + "AC": "H", + "A": "N", + "C": "H", + "S": "U", + "AV": "N", + "PR": "N", + "UI": "N", + "I": "N" + } + } + }, + "CVE_data_meta": { + "ID": "CVE-2020-4821", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-07-15T00:00:00" + }, + "data_version": "4.0" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4980.json b/2020/4xxx/CVE-2020-4980.json index 92c7d07463f..ed79c48412e 100644 --- a/2020/4xxx/CVE-2020-4980.json +++ b/2020/4xxx/CVE-2020-4980.json @@ -1,93 +1,93 @@ { - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6472891", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6472891", - "title" : "IBM Security Bulletin 6472891 (Qradar)" - }, - { - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192539", - "name" : "ibm-qradar-cve20204980-info-disc (192539)", - "refsource" : "XF" - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2021-07-15T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4980" - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "C" : "H", - "A" : "N", - "AC" : "H", - "SCORE" : "5.300", - "UI" : "N", - "I" : "N", - "S" : "U", - "PR" : "N", - "AV" : "A" - }, - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - } - } - }, - "data_format" : "MITRE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_type": "CVE", + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "7.3" - }, - { - "version_value" : "7.4" - } - ] - }, - "product_name" : "QRadar" - } - ] - } + "name": "https://www.ibm.com/support/pages/node/6472891", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6472891", + "title": "IBM Security Bulletin 6472891 (Qradar)" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192539", + "name": "ibm-qradar-cve20204980-info-disc (192539)", + "refsource": "XF" } - ] - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM QRadar SIEM 7.3 and 7.4 uses less secure methods for protecting data in transit between hosts when encrypt host connections is not enabled as well as data at rest. IBM X-Force ID: 192539." - } - ] - } -} + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-07-15T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4980" + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "C": "H", + "A": "N", + "AC": "H", + "SCORE": "5.300", + "UI": "N", + "I": "N", + "S": "U", + "PR": "N", + "AV": "A" + }, + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + } + } + }, + "data_format": "MITRE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "7.3" + }, + { + "version_value": "7.4" + } + ] + }, + "product_name": "QRadar" + } + ] + } + } + ] + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM QRadar SIEM 7.3 and 7.4 uses less secure methods for protecting data in transit between hosts when encrypt host connections is not enabled as well as data at rest. IBM X-Force ID: 192539." + } + ] + } +} \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22000.json b/2021/22xxx/CVE-2021-22000.json index 162404ac2db..d5aaa721ab1 100644 --- a/2021/22xxx/CVE-2021-22000.json +++ b/2021/22xxx/CVE-2021-22000.json @@ -53,6 +53,11 @@ "refsource": "FULLDISC", "name": "20210716 VMware ThinApp DLL hijacking vulnerability", "url": "http://seclists.org/fulldisclosure/2021/Jul/35" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html", + "url": "http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22555.json b/2021/22xxx/CVE-2021-22555.json index b37b89814e7..e7e88567448 100644 --- a/2021/22xxx/CVE-2021-22555.json +++ b/2021/22xxx/CVE-2021-22555.json @@ -94,6 +94,11 @@ "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html", + "url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25155.json b/2021/25xxx/CVE-2021-25155.json index e96f6b7ff64..b900ad72734 100644 --- a/2021/25xxx/CVE-2021-25155.json +++ b/2021/25xxx/CVE-2021-25155.json @@ -68,6 +68,16 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html", + "url": "http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25156.json b/2021/25xxx/CVE-2021-25156.json index 7397fc8c31c..1ae9cc17bc6 100644 --- a/2021/25xxx/CVE-2021-25156.json +++ b/2021/25xxx/CVE-2021-25156.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25157.json b/2021/25xxx/CVE-2021-25157.json index f0aa0f88123..d4b1aa98933 100644 --- a/2021/25xxx/CVE-2021-25157.json +++ b/2021/25xxx/CVE-2021-25157.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25158.json b/2021/25xxx/CVE-2021-25158.json index 37ab34caa83..d2051d07171 100644 --- a/2021/25xxx/CVE-2021-25158.json +++ b/2021/25xxx/CVE-2021-25158.json @@ -65,6 +65,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25159.json b/2021/25xxx/CVE-2021-25159.json index b3d811b0216..3ee0a41e293 100644 --- a/2021/25xxx/CVE-2021-25159.json +++ b/2021/25xxx/CVE-2021-25159.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25160.json b/2021/25xxx/CVE-2021-25160.json index 3eef3398d08..4c257c4f009 100644 --- a/2021/25xxx/CVE-2021-25160.json +++ b/2021/25xxx/CVE-2021-25160.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25161.json b/2021/25xxx/CVE-2021-25161.json index 8f8ad240abd..42d59dfb5ad 100644 --- a/2021/25xxx/CVE-2021-25161.json +++ b/2021/25xxx/CVE-2021-25161.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25162.json b/2021/25xxx/CVE-2021-25162.json index 30e99da1a0e..e0209c8bfba 100644 --- a/2021/25xxx/CVE-2021-25162.json +++ b/2021/25xxx/CVE-2021-25162.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36760.json b/2021/36xxx/CVE-2021-36760.json new file mode 100644 index 00000000000..2294d36977b --- /dev/null +++ b/2021/36xxx/CVE-2021-36760.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36760", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36761.json b/2021/36xxx/CVE-2021-36761.json new file mode 100644 index 00000000000..e85ff7f8122 --- /dev/null +++ b/2021/36xxx/CVE-2021-36761.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36761", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36762.json b/2021/36xxx/CVE-2021-36762.json new file mode 100644 index 00000000000..cc91eb55833 --- /dev/null +++ b/2021/36xxx/CVE-2021-36762.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36762", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36763.json b/2021/36xxx/CVE-2021-36763.json new file mode 100644 index 00000000000..41f74b44d1c --- /dev/null +++ b/2021/36xxx/CVE-2021-36763.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36763", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36764.json b/2021/36xxx/CVE-2021-36764.json new file mode 100644 index 00000000000..4cd5d2db2d9 --- /dev/null +++ b/2021/36xxx/CVE-2021-36764.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36764", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36765.json b/2021/36xxx/CVE-2021-36765.json new file mode 100644 index 00000000000..f0853268249 --- /dev/null +++ b/2021/36xxx/CVE-2021-36765.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36765", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36766.json b/2021/36xxx/CVE-2021-36766.json new file mode 100644 index 00000000000..0195763104a --- /dev/null +++ b/2021/36xxx/CVE-2021-36766.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-36766", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file