cvelist/2021/31xxx/CVE-2021-31617.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2021-04-23 07:00:48 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-01-31 16:01:07 +00:00
"ID": "CVE-2021-31617",
"STATE": "PUBLIC"
2021-04-23 07:00:48 +00:00
},
2022-01-31 16:01:07 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-04-23 07:00:48 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-01-31 16:01:07 +00:00
"value": "In ASQ in Stormshield Network Security (SNS) 1.0.0 through 2.7.8, 2.8.0 through 2.16.0, 3.0.0 through 3.7.20, 3.8.0 through 3.11.8, and 4.0.1 through 4.2.2, mishandling of memory management can lead to remote code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://advisories.stormshield.eu/",
"refsource": "MISC",
"name": "https://advisories.stormshield.eu/"
},
{
"refsource": "MISC",
"name": "https://advisories.stormshield.eu/2021-020/",
"url": "https://advisories.stormshield.eu/2021-020/"
2021-04-23 07:00:48 +00:00
}
]
}
}