From 36652e715f7f2c0c9df515c6410213f515a60de1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 29 Aug 2021 20:00:50 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/40xxx/CVE-2021-40172.json | 62 ++++++++++++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40173.json | 62 ++++++++++++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40174.json | 62 ++++++++++++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40175.json | 62 ++++++++++++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40176.json | 62 ++++++++++++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40177.json | 62 ++++++++++++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40178.json | 62 ++++++++++++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40179.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40180.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40181.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40182.json | 18 ++++++++++ 11 files changed, 506 insertions(+) create mode 100644 2021/40xxx/CVE-2021-40172.json create mode 100644 2021/40xxx/CVE-2021-40173.json create mode 100644 2021/40xxx/CVE-2021-40174.json create mode 100644 2021/40xxx/CVE-2021-40175.json create mode 100644 2021/40xxx/CVE-2021-40176.json create mode 100644 2021/40xxx/CVE-2021-40177.json create mode 100644 2021/40xxx/CVE-2021-40178.json create mode 100644 2021/40xxx/CVE-2021-40179.json create mode 100644 2021/40xxx/CVE-2021-40180.json create mode 100644 2021/40xxx/CVE-2021-40181.json create mode 100644 2021/40xxx/CVE-2021-40182.json diff --git a/2021/40xxx/CVE-2021-40172.json b/2021/40xxx/CVE-2021-40172.json new file mode 100644 index 00000000000..48fbb8f313a --- /dev/null +++ b/2021/40xxx/CVE-2021-40172.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-40172", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/log-management/readme.html#Build%205219", + "refsource": "MISC", + "name": "https://www.manageengine.com/log-management/readme.html#Build%205219" + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40173.json b/2021/40xxx/CVE-2021-40173.json new file mode 100644 index 00000000000..fc7c55c8f23 --- /dev/null +++ b/2021/40xxx/CVE-2021-40173.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-40173", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF attack on the server proxy settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/cloud-security/release-notes.html#build%204117", + "refsource": "MISC", + "name": "https://www.manageengine.com/cloud-security/release-notes.html#build%204117" + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40174.json b/2021/40xxx/CVE-2021-40174.json new file mode 100644 index 00000000000..6d1a5262d77 --- /dev/null +++ b/2021/40xxx/CVE-2021-40174.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-40174", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for disabling the logon security settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/log-management/readme.html#Build%205224", + "refsource": "MISC", + "name": "https://www.manageengine.com/log-management/readme.html#Build%205224" + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40175.json b/2021/40xxx/CVE-2021-40175.json new file mode 100644 index 00000000000..492e51a5ce4 --- /dev/null +++ b/2021/40xxx/CVE-2021-40175.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-40175", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/log-management/readme.html#Build%205219", + "refsource": "MISC", + "name": "https://www.manageengine.com/log-management/readme.html#Build%205219" + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40176.json b/2021/40xxx/CVE-2021-40176.json new file mode 100644 index 00000000000..38ae43fd802 --- /dev/null +++ b/2021/40xxx/CVE-2021-40176.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-40176", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Log360 before Build 5225 allows stored XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/log-management/readme.html#Build%205225", + "refsource": "MISC", + "name": "https://www.manageengine.com/log-management/readme.html#Build%205225" + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40177.json b/2021/40xxx/CVE-2021-40177.json new file mode 100644 index 00000000000..72fb401d6e9 --- /dev/null +++ b/2021/40xxx/CVE-2021-40177.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-40177", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/log-management/readme.html#Build%205225", + "refsource": "MISC", + "name": "https://www.manageengine.com/log-management/readme.html#Build%205225" + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40178.json b/2021/40xxx/CVE-2021-40178.json new file mode 100644 index 00000000000..d759a867839 --- /dev/null +++ b/2021/40xxx/CVE-2021-40178.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-40178", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/log-management/readme.html#Build%205224", + "refsource": "MISC", + "name": "https://www.manageengine.com/log-management/readme.html#Build%205224" + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40179.json b/2021/40xxx/CVE-2021-40179.json new file mode 100644 index 00000000000..d328e549bd2 --- /dev/null +++ b/2021/40xxx/CVE-2021-40179.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40179", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40180.json b/2021/40xxx/CVE-2021-40180.json new file mode 100644 index 00000000000..299b1281be6 --- /dev/null +++ b/2021/40xxx/CVE-2021-40180.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40180", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40181.json b/2021/40xxx/CVE-2021-40181.json new file mode 100644 index 00000000000..fa7d8c858d9 --- /dev/null +++ b/2021/40xxx/CVE-2021-40181.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40181", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40182.json b/2021/40xxx/CVE-2021-40182.json new file mode 100644 index 00000000000..68cbc5b3fad --- /dev/null +++ b/2021/40xxx/CVE-2021-40182.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40182", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file