cvelist/2021/42xxx/CVE-2021-42952.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2021-10-25 07:00:57 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-02-25 20:01:19 +00:00
"ID": "CVE-2021-42952",
"STATE": "PUBLIC"
2021-10-25 07:00:57 +00:00
},
2022-02-25 20:01:19 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-10-25 07:00:57 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-02-26 05:01:18 +00:00
"value": "Zepl Notebooks before 2021-10-25 are affected by a sandbox escape vulnerability. Upon launching Remote Code Execution from the Notebook, users can then use that to subsequently escape the running context sandbox and proceed to access internal Zepl assets including cloud metadata services."
2022-02-25 20:01:19 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://zepl.com",
"refsource": "MISC",
"name": "http://zepl.com"
},
{
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2022/Feb/32",
"url": "https://seclists.org/fulldisclosure/2022/Feb/32"
2021-10-25 07:00:57 +00:00
}
]
}
}