Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit b9b66cc

Browse files
committed
"-Synchronized-Data."
1 parent d7550ce commit b9b66cc

12 files changed

+2575
-1729
lines changed

2019/13xxx/CVE-2019-13939.json

Lines changed: 67 additions & 227 deletions
Large diffs are not rendered by default.

2021/25xxx/CVE-2021-25663.json

Lines changed: 70 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,33 @@
11
{
2+
"data_version": "4.0",
3+
"data_type": "CVE",
4+
"data_format": "MITRE",
25
"CVE_data_meta": {
3-
"ASSIGNER": "[email protected]",
46
"ID": "CVE-2021-25663",
7+
"ASSIGNER": "[email protected]",
58
"STATE": "PUBLIC"
69
},
7-
"data_format": "MITRE",
8-
"data_version": "4.0",
9-
"data_type": "CVE",
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes IPv6 headers does not check the lengths of extension header options, allowing attackers to put this function into an infinite loop with crafted length values."
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')",
25+
"cweId": "CWE-835"
26+
}
27+
]
28+
}
29+
]
30+
},
1031
"affects": {
1132
"vendor": {
1233
"vendor_data": [
@@ -15,11 +36,25 @@
1536
"product": {
1637
"product_data": [
1738
{
18-
"product_name": "Capital VSTAR",
39+
"product_name": "Capital Embedded AR Classic 431-422",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_affected": "<",
44+
"version_name": "0",
45+
"version_value": "*"
46+
}
47+
]
48+
}
49+
},
50+
{
51+
"product_name": "Capital Embedded AR Classic R20-11",
1952
"version": {
2053
"version_data": [
2154
{
22-
"version_value": "Versions including affected IPv6 stack"
55+
"version_affected": "<",
56+
"version_name": "0",
57+
"version_value": "V2303"
2358
}
2459
]
2560
}
@@ -29,6 +64,7 @@
2964
"version": {
3065
"version_data": [
3166
{
67+
"version_affected": "=",
3268
"version_value": "All versions"
3369
}
3470
]
@@ -39,7 +75,9 @@
3975
"version": {
4076
"version_data": [
4177
{
42-
"version_value": "All versions < V2017.02.4"
78+
"version_affected": "<",
79+
"version_name": "0",
80+
"version_value": "V2017.02.4"
4381
}
4482
]
4583
}
@@ -49,7 +87,9 @@
4987
"version": {
5088
"version_data": [
5189
{
52-
"version_value": "All versions < V4.1.0"
90+
"version_affected": "<",
91+
"version_name": "0",
92+
"version_value": "V4.1.0"
5393
}
5494
]
5595
}
@@ -59,7 +99,9 @@
5999
"version": {
60100
"version_data": [
61101
{
62-
"version_value": "Versions including affected IPv6 stack"
102+
"version_affected": "<",
103+
"version_name": "0",
104+
"version_value": "*"
63105
}
64106
]
65107
}
@@ -70,37 +112,32 @@
70112
]
71113
}
72114
},
73-
"problemtype": {
74-
"problemtype_data": [
75-
{
76-
"description": [
77-
{
78-
"lang": "eng",
79-
"value": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')"
80-
}
81-
]
82-
}
83-
]
84-
},
85-
"description": {
86-
"description_data": [
87-
{
88-
"lang": "eng",
89-
"value": "A vulnerability has been identified in Capital VSTAR (Versions including affected IPv6 stack), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected IPv6 stack). The function that processes IPv6 headers does not check the lengths of extension header options, allowing attackers to put this function into an infinite loop with crafted length values."
90-
}
91-
]
92-
},
93115
"references": {
94116
"reference_data": [
95117
{
96-
"refsource": "MISC",
97118
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf",
119+
"refsource": "MISC",
98120
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf"
99121
},
100122
{
101-
"refsource": "CONFIRM",
102-
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05",
103-
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05"
123+
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05",
124+
"refsource": "MISC",
125+
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05"
126+
},
127+
{
128+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html",
129+
"refsource": "MISC",
130+
"name": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html"
131+
}
132+
]
133+
},
134+
"impact": {
135+
"cvss": [
136+
{
137+
"version": "3.1",
138+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
139+
"baseScore": 7.5,
140+
"baseSeverity": "HIGH"
104141
}
105142
]
106143
}

2021/25xxx/CVE-2021-25664.json

Lines changed: 69 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,33 @@
11
{
2+
"data_version": "4.0",
3+
"data_type": "CVE",
4+
"data_format": "MITRE",
25
"CVE_data_meta": {
3-
"ASSIGNER": "[email protected]",
46
"ID": "CVE-2021-25664",
7+
"ASSIGNER": "[email protected]",
58
"STATE": "PUBLIC"
69
},
7-
"data_format": "MITRE",
8-
"data_version": "4.0",
9-
"data_type": "CVE",
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing attackers to put the function into an infinite loop by supplying arbitrary length values."
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')",
25+
"cweId": "CWE-835"
26+
}
27+
]
28+
}
29+
]
30+
},
1031
"affects": {
1132
"vendor": {
1233
"vendor_data": [
@@ -15,11 +36,25 @@
1536
"product": {
1637
"product_data": [
1738
{
18-
"product_name": "Capital VSTAR",
39+
"product_name": "Capital Embedded AR Classic 431-422",
1940
"version": {
2041
"version_data": [
2142
{
22-
"version_value": "Versions including affected IPv6 stack"
43+
"version_affected": "<",
44+
"version_name": "0",
45+
"version_value": "*"
46+
}
47+
]
48+
}
49+
},
50+
{
51+
"product_name": "Capital Embedded AR Classic R20-11",
52+
"version": {
53+
"version_data": [
54+
{
55+
"version_affected": "<",
56+
"version_name": "0",
57+
"version_value": "V2303"
2358
}
2459
]
2560
}
@@ -29,6 +64,7 @@
2964
"version": {
3065
"version_data": [
3166
{
67+
"version_affected": "=",
3268
"version_value": "All versions"
3369
}
3470
]
@@ -39,7 +75,9 @@
3975
"version": {
4076
"version_data": [
4177
{
42-
"version_value": "All versions < V2017.02.4"
78+
"version_affected": "<",
79+
"version_name": "0",
80+
"version_value": "V2017.02.4"
4381
}
4482
]
4583
}
@@ -49,7 +87,9 @@
4987
"version": {
5088
"version_data": [
5189
{
52-
"version_value": "All versions < V4.1.0"
90+
"version_affected": "<",
91+
"version_name": "0",
92+
"version_value": "V4.1.0"
5393
}
5494
]
5595
}
@@ -59,7 +99,9 @@
5999
"version": {
60100
"version_data": [
61101
{
62-
"version_value": "Versions including affected IPv6 stack"
102+
"version_affected": "<",
103+
"version_name": "0",
104+
"version_value": "*"
63105
}
64106
]
65107
}
@@ -70,37 +112,32 @@
70112
]
71113
}
72114
},
73-
"problemtype": {
74-
"problemtype_data": [
75-
{
76-
"description": [
77-
{
78-
"lang": "eng",
79-
"value": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')"
80-
}
81-
]
82-
}
83-
]
84-
},
85-
"description": {
86-
"description_data": [
87-
{
88-
"lang": "eng",
89-
"value": "A vulnerability has been identified in Capital VSTAR (Versions including affected IPv6 stack), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing attackers to put the function into an infinite loop by supplying arbitrary length values."
90-
}
91-
]
92-
},
93115
"references": {
94116
"reference_data": [
95117
{
96-
"refsource": "MISC",
97118
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf",
119+
"refsource": "MISC",
98120
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf"
99121
},
100122
{
123+
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05",
101124
"refsource": "MISC",
102-
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05",
103-
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05"
125+
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05"
126+
},
127+
{
128+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html",
129+
"refsource": "MISC",
130+
"name": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html"
131+
}
132+
]
133+
},
134+
"impact": {
135+
"cvss": [
136+
{
137+
"version": "3.1",
138+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
139+
"baseScore": 7.5,
140+
"baseSeverity": "HIGH"
104141
}
105142
]
106143
}

0 commit comments

Comments
 (0)