"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-29 15:00:39 +00:00
parent 36b53ead08
commit 2a4b04bd51
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 151 additions and 4 deletions

View File

@ -103,7 +103,7 @@
}
]
},
"vendor_name": "Weidmüller"
"vendor_name": "Weidm\u00fcller"
}
]
}
@ -162,6 +162,11 @@
"name": "https://cert.vde.com/en-us/advisories/vde-2020-038",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
},
{
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
}
]
},

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quick-cms-and-quick-cart/",
"url": "https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quick-cms-and-quick-cart/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html"
}
]
}

View File

@ -88,6 +88,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html",
"url": "http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html",
"url": "http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html"
}
]
},

View File

@ -4,14 +4,64 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20586",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Robot Controller MELFA FR Series; Robot Controller CR Series; Cooperative Robot ASSISTA",
"version": {
"version_data": [
{
"version_value": "Controller \"CR800-*V*D\" of RV-*FR***-D-* all versions, Controller \"CR800-*HD\" of RH-*FRH***-D-* all versions, Controller \"CR800-*HRD\" of RH-*FRHR***-D-* all versions, Controller \"CR800-*V*R with R16RTCPU\" of RV-*FR***-R-* all versions, Controller \"CR800-*HR with R16RTCPU\" of RH-*FRH***-R-* all versions, Controller \"CR800-*HRR with R16RTCPU\" of RH-*FRHR***-R-* all versions, Controller \"CR800-*V*Q with Q172DSRCPU\" of RV-*FR***-Q-* all versions, Controller \"CR800-*HQ with Q172DSRCPU\" of RH-*FRH***-Q-* all versions, Controller \"CR800-*HRQ with Q172DSRCPU\" of RH-*FRHR***-Q-* all versions"
},
{
"version_value": "Controller \"CR800-CVD\" of RV-8CRL-D-* all versions, Controller \"CR800-CHD\" of RH-*CRH**-D-* all versions"
},
{
"version_value": "Controller \"CR800-05VD\" of RV-5AS-D-* all versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Resource management errors"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-019_en.pdf",
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-019_en.pdf"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Resource management errors vulnerability in a robot controller of MELFA FR Series(controller \"CR800-*V*D\" of RV-*FR***-D-* all versions, controller \"CR800-*HD\" of RH-*FRH***-D-* all versions, controller \"CR800-*HRD\" of RH-*FRHR***-D-* all versions, controller \"CR800-*V*R with R16RTCPU\" of RV-*FR***-R-* all versions, controller \"CR800-*HR with R16RTCPU\" of RH-*FRH***-R-* all versions, controller \"CR800-*HRR with R16RTCPU\" of RH-*FRHR***-R-* all versions, controller \"CR800-*V*Q with Q172DSRCPU\" of RV-*FR***-Q-* all versions, controller \"CR800-*HQ with Q172DSRCPU\" of RH-*FRH***-Q-* all versions, controller \"CR800-*HRQ with Q172DSRCPU\" of RH-*FRHR***-Q-* all versions) and a robot controller of MELFA CR Series(controller \"CR800-CVD\" of RV-8CRL-D-* all versions, controller \"CR800-CHD\" of RH-*CRH**-D-* all versions) as well as a cooperative robot ASSISTA(controller \"CR800-05VD\" of RV-5AS-D-* all versions) allows a remote unauthenticated attacker to cause a DoS of the execution of the robot program and the Ethernet communication by sending a large amount of packets in burst over a short period of time. As a result of DoS, an error may occur. A reset is required to recover it if the error occurs."
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/snlbaral/Hide-Thread-Content/issues/1",
"refsource": "MISC",
"name": "https://github.com/snlbaral/Hide-Thread-Content/issues/1"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html",
"url": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html"
}
]
}

View File

@ -0,0 +1,77 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-3345",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "_gcry_md_block_write in cipher/hash-common.c in Libgcrypt before 1.9.1 has a heap-based buffer overflow when the digest final function sets a large count value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08",
"refsource": "MISC",
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08"
},
{
"url": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html",
"refsource": "MISC",
"name": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html"
},
{
"url": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html",
"refsource": "MISC",
"name": "https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html"
},
{
"url": "https://gnupg.org",
"refsource": "MISC",
"name": "https://gnupg.org"
}
]
}
}