cvelist/2020/21xxx/CVE-2020-21699.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-08-13 12:05:06 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2023-08-22 18:25:09 +00:00
"ID": "CVE-2020-21699",
"STATE": "PUBLIC"
2020-08-13 12:05:06 +00:00
},
2023-08-22 18:25:09 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-08-13 12:05:06 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-08-22 18:25:09 +00:00
"value": "The web server Tengine 2.2.2 developed in the Nginx version from 0.5.6 thru 1.13.2 is vulnerable to an integer overflow vulnerability in the nginx range filter module, resulting in the leakage of potentially sensitive information triggered by specially crafted requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx",
"refsource": "MISC",
"name": "https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx"
2020-08-13 12:05:06 +00:00
}
]
}
}