mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 10:18:17 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
36b53ead08
commit
2a4b04bd51
@ -103,7 +103,7 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Weidmüller"
|
||||
"vendor_name": "Weidm\u00fcller"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -162,6 +162,11 @@
|
||||
"name": "https://cert.vde.com/en-us/advisories/vde-2020-038",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05",
|
||||
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quick-cms-and-quick-cart/",
|
||||
"url": "https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quick-cms-and-quick-cart/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -88,6 +88,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html",
|
||||
"url": "http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html",
|
||||
"url": "http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,14 +4,64 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20586",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Robot Controller MELFA FR Series; Robot Controller CR Series; Cooperative Robot ASSISTA",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Controller \"CR800-*V*D\" of RV-*FR***-D-* all versions, Controller \"CR800-*HD\" of RH-*FRH***-D-* all versions, Controller \"CR800-*HRD\" of RH-*FRHR***-D-* all versions, Controller \"CR800-*V*R with R16RTCPU\" of RV-*FR***-R-* all versions, Controller \"CR800-*HR with R16RTCPU\" of RH-*FRH***-R-* all versions, Controller \"CR800-*HRR with R16RTCPU\" of RH-*FRHR***-R-* all versions, Controller \"CR800-*V*Q with Q172DSRCPU\" of RV-*FR***-Q-* all versions, Controller \"CR800-*HQ with Q172DSRCPU\" of RH-*FRH***-Q-* all versions, Controller \"CR800-*HRQ with Q172DSRCPU\" of RH-*FRHR***-Q-* all versions"
|
||||
},
|
||||
{
|
||||
"version_value": "Controller \"CR800-CVD\" of RV-8CRL-D-* all versions, Controller \"CR800-CHD\" of RH-*CRH**-D-* all versions"
|
||||
},
|
||||
{
|
||||
"version_value": "Controller \"CR800-05VD\" of RV-5AS-D-* all versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Resource management errors"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-019_en.pdf",
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-019_en.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Resource management errors vulnerability in a robot controller of MELFA FR Series(controller \"CR800-*V*D\" of RV-*FR***-D-* all versions, controller \"CR800-*HD\" of RH-*FRH***-D-* all versions, controller \"CR800-*HRD\" of RH-*FRHR***-D-* all versions, controller \"CR800-*V*R with R16RTCPU\" of RV-*FR***-R-* all versions, controller \"CR800-*HR with R16RTCPU\" of RH-*FRH***-R-* all versions, controller \"CR800-*HRR with R16RTCPU\" of RH-*FRHR***-R-* all versions, controller \"CR800-*V*Q with Q172DSRCPU\" of RV-*FR***-Q-* all versions, controller \"CR800-*HQ with Q172DSRCPU\" of RH-*FRH***-Q-* all versions, controller \"CR800-*HRQ with Q172DSRCPU\" of RH-*FRHR***-Q-* all versions) and a robot controller of MELFA CR Series(controller \"CR800-CVD\" of RV-8CRL-D-* all versions, controller \"CR800-CHD\" of RH-*CRH**-D-* all versions) as well as a cooperative robot ASSISTA(controller \"CR800-05VD\" of RV-5AS-D-* all versions) allows a remote unauthenticated attacker to cause a DoS of the execution of the robot program and the Ethernet communication by sending a large amount of packets in burst over a short period of time. As a result of DoS, an error may occur. A reset is required to recover it if the error occurs."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/snlbaral/Hide-Thread-Content/issues/1",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/snlbaral/Hide-Thread-Content/issues/1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html",
|
||||
"url": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
77
2021/3xxx/CVE-2021-3345.json
Normal file
77
2021/3xxx/CVE-2021-3345.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2021-3345",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "_gcry_md_block_write in cipher/hash-common.c in Libgcrypt before 1.9.1 has a heap-based buffer overflow when the digest final function sets a large count value."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html"
|
||||
},
|
||||
{
|
||||
"url": "https://gnupg.org",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gnupg.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user