cvelist/2021/36xxx/CVE-2021-36751.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2021-07-15 09:00:55 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-01-02 16:01:00 +00:00
"ID": "CVE-2021-36751",
"STATE": "PUBLIC"
2021-07-15 09:00:55 +00:00
},
2022-01-02 16:01:00 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-07-15 09:00:55 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-12-12 16:00:38 +00:00
"value": "ENC DataVault 7.2.3 and before, and OEM versions, use an encryption algorithm that is vulnerable to data manipulation (without knowledge of the key). This is called ciphertext malleability. There is no data integrity mechanism to detect this manipulation."
2022-01-02 16:01:00 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software",
"url": "https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software"
},
{
"refsource": "MISC",
"name": "https://pretalx.c3voc.de/rc3-2021-r3s/talk/QMYGR3/",
"url": "https://pretalx.c3voc.de/rc3-2021-r3s/talk/QMYGR3/"
2022-11-25 05:00:35 +00:00
},
{
"refsource": "MISC",
"name": "https://encsecurity.zendesk.com/hc/en-us/articles/7860771829533",
"url": "https://encsecurity.zendesk.com/hc/en-us/articles/7860771829533"
2021-07-15 09:00:55 +00:00
}
]
}
}