Skip to content

Commit

Permalink
"-Synchronized-Data."
Browse files Browse the repository at this point in the history
  • Loading branch information
cve-team committed Jul 9, 2021
1 parent 848d115 commit 0f4a356
Show file tree
Hide file tree
Showing 14 changed files with 395 additions and 27 deletions.
61 changes: 55 additions & 6 deletions 2012/1xxx/CVE-2012-1102.json
Original file line number Diff line number Diff line change
@@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2012-1102",
"STATE": "RESERVED"
"ASSIGNER": "[email protected]",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "perl-xml-atom",
"version": {
"version_data": [
{
"version_value": "perl-xml-atom 0.39"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-611"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes",
"url": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes"
},
{
"refsource": "MISC",
"name": "https://seclists.org/oss-sec/2012/q1/549",
"url": "https://seclists.org/oss-sec/2012/q1/549"
}
]
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used."
}
]
}
Expand Down
71 changes: 65 additions & 6 deletions 2012/2xxx/CVE-2012-2666.json
Original file line number Diff line number Diff line change
@@ -1,17 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2012-2666",
"STATE": "RESERVED"
"ASSIGNER": "[email protected]",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "go/golang",
"version": {
"version_data": [
{
"version_value": "go/golang 1.0.2"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-377"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666",
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666"
},
{
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=765455",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=765455"
},
{
"refsource": "MISC",
"name": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd",
"url": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd"
},
{
"refsource": "MISC",
"name": "https://codereview.appspot.com/5992078",
"url": "https://codereview.appspot.com/5992078"
}
]
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "golang/go in 1.0.2 fixes all.bash on shared machines. dotest() in src/pkg/debug/gosym/pclntab_test.go creates a temporary file with predicable name and executes it as shell script."
}
]
}
Expand Down
5 changes: 5 additions & 0 deletions 2020/1xxx/CVE-2020-1927.json
Original file line number Diff line number Diff line change
Expand Up @@ -168,6 +168,11 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2020/1xxx/CVE-2020-1934.json
Original file line number Diff line number Diff line change
Expand Up @@ -153,6 +153,11 @@
"refsource": "MLIST",
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2020/35xxx/CVE-2020-35452.json
Original file line number Diff line number Diff line change
Expand Up @@ -238,6 +238,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210702-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210702-0001/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2021/26xxx/CVE-2021-26690.json
Original file line number Diff line number Diff line change
Expand Up @@ -238,6 +238,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210702-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210702-0001/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2021/26xxx/CVE-2021-26691.json
Original file line number Diff line number Diff line change
Expand Up @@ -238,6 +238,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210702-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210702-0001/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2021/30xxx/CVE-2021-30641.json
Original file line number Diff line number Diff line change
Expand Up @@ -113,6 +113,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210702-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210702-0001/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2021/31xxx/CVE-2021-31618.json
Original file line number Diff line number Diff line change
Expand Up @@ -102,6 +102,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-181f29c392",
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/A73QJ4HPUMU26I6EULG6SCK67TUEXZYR/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"
}
]
},
Expand Down
50 changes: 47 additions & 3 deletions 2021/32xxx/CVE-2021-32972.json
Original file line number Diff line number Diff line change
Expand Up @@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-32972",
"ASSIGNER": "[email protected]",
"STATE": "RESERVED"
"ASSIGNER": "[email protected]",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Panasonic FPWIN Pro",
"version": {
"version_data": [
{
"version_value": "All Versions 7.5.1.1 and prior"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-03",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-03"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Panasonic FPWIN Pro, all Versions 7.5.1.1 and prior, allows an attacker to craft a project file specifying a URI that causes the XML parser to access the URI and embed the contents, which may allow the attacker to disclose information that is accessible in the context of the user executing software."
}
]
}
Expand Down
50 changes: 47 additions & 3 deletions 2021/3xxx/CVE-2021-3570.json
Original file line number Diff line number Diff line change
Expand Up @@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3570",
"ASSIGNER": "[email protected]",
"STATE": "RESERVED"
"ASSIGNER": "[email protected]",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "linuxptp",
"version": {
"version_data": [
{
"version_value": "linuxptp 3.1.1, linuxptp 2.0.1, linuxptp 1.9.3, linuxptp 1.8.1, linuxptp 1.7.1, linuxptp 1.6.1, linuxptp 1.5.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1966240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966240"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1."
}
]
}
Expand Down
Loading

0 comments on commit 0f4a356

Please sign in to comment.