cvelist/2021/41xxx/CVE-2021-41635.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2021-09-27 06:01:02 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-06-24 12:00:47 +00:00
"ID": "CVE-2021-41635",
"STATE": "PUBLIC"
2021-09-27 06:01:02 +00:00
},
2022-06-24 12:00:47 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-09-27 06:01:02 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-06-24 12:00:47 +00:00
"value": "When installed as Windows service MELAG FTP Server 2.2.0.4 is run as SYSTEM user, which grants remote attackers to abuse misconfigurations or vulnerabilities with administrative access over the entire host system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/",
"url": "https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/"
2021-09-27 06:01:02 +00:00
}
]
}
}