Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit b5f87c6

Browse files
committed
"-Synchronized-Data."
1 parent 7c606a8 commit b5f87c6

File tree

10 files changed

+642
-104
lines changed

10 files changed

+642
-104
lines changed

2021/22xxx/CVE-2021-22531.json

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,58 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-22531",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"vendor_name": "n/a",
15+
"product": {
16+
"product_data": [
17+
{
18+
"product_name": "NetIQ Access Manager",
19+
"version": {
20+
"version_data": [
21+
{
22+
"version_value": "4.5, 5.0"
23+
}
24+
]
25+
}
26+
}
27+
]
28+
}
29+
}
30+
]
31+
}
32+
},
33+
"problemtype": {
34+
"problemtype_data": [
35+
{
36+
"description": [
37+
{
38+
"lang": "eng",
39+
"value": "Cross Site Scripting vulnerability"
40+
}
41+
]
42+
}
43+
]
44+
},
45+
"references": {
46+
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager502-release-notes/accessmanager502-release-notes.html",
50+
"url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager502-release-notes/accessmanager502-release-notes.html"
51+
}
52+
]
953
},
1054
"description": {
1155
"description_data": [
1256
{
1357
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
58+
"value": "A bug exist in the input parameter of Access Manager that allows supply of invalid character to trigger cross-site scripting vulnerability. This affects NetIQ Access Manager 4.5 and 5.0"
1559
}
1660
]
1761
}

2021/26xxx/CVE-2021-26317.json

Lines changed: 70 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,82 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
3+
"ASSIGNER": "[email protected]",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
65
"ID": "CVE-2021-26317",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
6+
"STATE": "PUBLIC"
97
},
8+
"affects": {
9+
"vendor": {
10+
"vendor_data": [
11+
{
12+
"product": {
13+
"product_data": [
14+
{
15+
"product_name": "Ryzen\u2122 Series ",
16+
"version": {
17+
"version_data": [
18+
{
19+
"version_affected": "=",
20+
"version_value": "various"
21+
}
22+
]
23+
}
24+
},
25+
{
26+
"product_name": " Athlon\u2122 Series ",
27+
"version": {
28+
"version_data": [
29+
{
30+
"version_affected": "=",
31+
"version_value": "various"
32+
}
33+
]
34+
}
35+
}
36+
]
37+
},
38+
"vendor_name": "AMD"
39+
}
40+
]
41+
}
42+
},
43+
"data_format": "MITRE",
44+
"data_type": "CVE",
45+
"data_version": "4.0",
1046
"description": {
1147
"description_data": [
1248
{
1349
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
50+
"value": "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution."
1551
}
1652
]
53+
},
54+
"generator": {
55+
"engine": "Vulnogram 0.0.9"
56+
},
57+
"problemtype": {
58+
"problemtype_data": [
59+
{
60+
"description": [
61+
{
62+
"lang": "eng",
63+
"value": "tbd"
64+
}
65+
]
66+
}
67+
]
68+
},
69+
"references": {
70+
"reference_data": [
71+
{
72+
"refsource": "MISC",
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
75+
}
76+
]
77+
},
78+
"source": {
79+
"advisory": "AMD-SB-1027 ",
80+
"discovery": "UNKNOWN"
1781
}
1882
}

2021/26xxx/CVE-2021-26363.json

Lines changed: 70 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,82 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
3+
"ASSIGNER": "[email protected]",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
65
"ID": "CVE-2021-26363",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
6+
"STATE": "PUBLIC"
97
},
8+
"affects": {
9+
"vendor": {
10+
"vendor_data": [
11+
{
12+
"product": {
13+
"product_data": [
14+
{
15+
"product_name": "Ryzen\u2122 Series ",
16+
"version": {
17+
"version_data": [
18+
{
19+
"version_affected": "=",
20+
"version_value": "various"
21+
}
22+
]
23+
}
24+
},
25+
{
26+
"product_name": " Athlon\u2122 Series ",
27+
"version": {
28+
"version_data": [
29+
{
30+
"version_affected": "=",
31+
"version_value": "various"
32+
}
33+
]
34+
}
35+
}
36+
]
37+
},
38+
"vendor_name": "AMD"
39+
}
40+
]
41+
}
42+
},
43+
"data_format": "MITRE",
44+
"data_type": "CVE",
45+
"data_version": "4.0",
1046
"description": {
1147
"description_data": [
1248
{
1349
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
50+
"value": "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure."
1551
}
1652
]
53+
},
54+
"generator": {
55+
"engine": "Vulnogram 0.0.9"
56+
},
57+
"problemtype": {
58+
"problemtype_data": [
59+
{
60+
"description": [
61+
{
62+
"lang": "eng",
63+
"value": "tbd"
64+
}
65+
]
66+
}
67+
]
68+
},
69+
"references": {
70+
"reference_data": [
71+
{
72+
"refsource": "MISC",
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
75+
}
76+
]
77+
},
78+
"source": {
79+
"advisory": "AMD-SB-1027 ",
80+
"discovery": "UNKNOWN"
1781
}
1882
}

2021/26xxx/CVE-2021-26368.json

Lines changed: 70 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,82 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
3+
"ASSIGNER": "[email protected]",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
65
"ID": "CVE-2021-26368",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
6+
"STATE": "PUBLIC"
97
},
8+
"affects": {
9+
"vendor": {
10+
"vendor_data": [
11+
{
12+
"product": {
13+
"product_data": [
14+
{
15+
"product_name": "Ryzen\u2122 Series ",
16+
"version": {
17+
"version_data": [
18+
{
19+
"version_affected": "=",
20+
"version_value": "various"
21+
}
22+
]
23+
}
24+
},
25+
{
26+
"product_name": " Athlon\u2122 Series ",
27+
"version": {
28+
"version_data": [
29+
{
30+
"version_affected": "=",
31+
"version_value": "various"
32+
}
33+
]
34+
}
35+
}
36+
]
37+
},
38+
"vendor_name": "AMD"
39+
}
40+
]
41+
}
42+
},
43+
"data_format": "MITRE",
44+
"data_type": "CVE",
45+
"data_version": "4.0",
1046
"description": {
1147
"description_data": [
1248
{
1349
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
50+
"value": "Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service."
1551
}
1652
]
53+
},
54+
"generator": {
55+
"engine": "Vulnogram 0.0.9"
56+
},
57+
"problemtype": {
58+
"problemtype_data": [
59+
{
60+
"description": [
61+
{
62+
"lang": "eng",
63+
"value": "tbd"
64+
}
65+
]
66+
}
67+
]
68+
},
69+
"references": {
70+
"reference_data": [
71+
{
72+
"refsource": "MISC",
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
75+
}
76+
]
77+
},
78+
"source": {
79+
"advisory": "AMD-SB-1027 ",
80+
"discovery": "UNKNOWN"
1781
}
1882
}

0 commit comments

Comments
 (0)