cvelist/2021/27xxx/CVE-2021-27183.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2021-02-10 20:00:59 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-04-14 23:00:42 +00:00
"ID": "CVE-2021-27183",
"STATE": "PUBLIC"
2021-02-10 20:00:59 +00:00
},
2021-04-14 23:00:42 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-02-10 20:00:59 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-04-14 23:00:42 +00:00
"value": "An issue was discovered in MDaemon before 20.0.4. Administrators can use Remote Administration to exploit an Arbitrary File Write vulnerability. An attacker is able to create new files in any location of the filesystem, or he may be able to modify existing files. This vulnerability may directly lead to Remote Code Execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.altn.com/Support/SecurityUpdate/MD011221_MDaemon_EN/",
"refsource": "MISC",
"name": "https://www.altn.com/Support/SecurityUpdate/MD011221_MDaemon_EN/"
},
{
"refsource": "MISC",
"name": "https://github.com/chudyPB/MDaemon-Advisories",
"url": "https://github.com/chudyPB/MDaemon-Advisories"
2021-02-10 20:00:59 +00:00
}
]
}
}