cvelist/2021/31xxx/CVE-2021-31988.json

70 lines
2.2 KiB
JSON
Raw Normal View History

2021-04-30 23:00:49 +00:00
{
2024-11-08 09:00:32 +00:00
"data_version": "4.0",
2021-04-30 23:00:49 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2021-31988",
2021-10-05 22:00:52 +00:00
"ASSIGNER": "product-security@axis.com",
"STATE": "PUBLIC"
},
2024-11-08 09:00:32 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-1286: Improper Validation of Syntactic Correctness of Input",
"cweId": "CWE-1286"
}
]
}
]
},
2021-10-05 22:00:52 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2024-11-08 09:00:32 +00:00
"vendor_name": "Axis",
2021-10-05 22:00:52 +00:00
"product": {
"product_data": [
{
"product_name": "AXIS OS",
"version": {
"version_data": [
{
2024-11-08 09:00:32 +00:00
"version_affected": "=",
2021-10-05 22:00:52 +00:00
"version_value": "AXIS OS 5.51 or later"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
2024-11-08 09:00:32 +00:00
"url": "https://www.axis.com/files/tech_notes/CVE-2021-31988.pdf",
2021-10-05 22:00:52 +00:00
"refsource": "MISC",
2024-11-08 09:00:32 +00:00
"name": "https://www.axis.com/files/tech_notes/CVE-2021-31988.pdf"
2021-10-05 22:00:52 +00:00
}
]
2021-04-30 23:00:49 +00:00
},
2024-11-08 09:00:32 +00:00
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
2021-04-30 23:00:49 +00:00
}
}