"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-10-27 19:01:04 +00:00
parent 1be3fc1707
commit 396b7f47c9
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
21 changed files with 264 additions and 10 deletions

View File

@ -156,6 +156,21 @@
"refsource": "MLIST",
"name": "[oss-security] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs",
"url": "http://www.openwall.com/lists/oss-security/2021/10/07/4"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-21250",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-21250",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "CSZ CMS v1.2.4 was discovered to contain an arbitrary file upload vulnerability in the component /core/MY_Security.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/cskaza/cszcms/issues/22",
"refsource": "MISC",
"name": "https://github.com/cskaza/cszcms/issues/22"
}
]
}

View File

@ -81,6 +81,21 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212815",
"name": "https://support.apple.com/en-us/HT212815"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -65,6 +65,16 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212819",
"name": "https://support.apple.com/en-us/HT212819"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -49,6 +49,11 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212814",
"name": "https://support.apple.com/en-us/HT212814"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -49,6 +49,11 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212814",
"name": "https://support.apple.com/en-us/HT212814"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -49,6 +49,11 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212814",
"name": "https://support.apple.com/en-us/HT212814"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -49,6 +49,11 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212814",
"name": "https://support.apple.com/en-us/HT212814"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -113,6 +113,21 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212817",
"name": "https://support.apple.com/en-us/HT212817"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -81,6 +81,21 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212815",
"name": "https://support.apple.com/en-us/HT212815"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -49,6 +49,11 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212814",
"name": "https://support.apple.com/en-us/HT212814"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -129,6 +129,21 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212815",
"name": "https://support.apple.com/en-us/HT212815"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -129,6 +129,21 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212815",
"name": "https://support.apple.com/en-us/HT212815"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -129,6 +129,21 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212815",
"name": "https://support.apple.com/en-us/HT212815"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -128,6 +128,26 @@
"refsource": "MLIST",
"name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
"url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-8 Additional information for APPLE-SA-2021-09-20-5 Safari 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/60"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -134,6 +134,21 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212817",
"name": "https://support.apple.com/en-us/HT212817"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -96,6 +96,16 @@
"refsource": "MLIST",
"name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
"url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-8 Additional information for APPLE-SA-2021-09-20-5 Safari 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/60"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -144,6 +144,26 @@
"refsource": "MLIST",
"name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
"url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-8 Additional information for APPLE-SA-2021-09-20-5 Safari 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/60"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Oct/62"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/61"
}
]
},

View File

@ -81,6 +81,11 @@
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212815",
"name": "https://support.apple.com/en-us/HT212815"
},
{
"refsource": "FULLDISC",
"name": "20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Oct/63"
}
]
},

View File

@ -36,7 +36,7 @@
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic.\r These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.\r "
"value": "Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet."
}
]
},
@ -83,4 +83,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -36,7 +36,7 @@
"description_data": [
{
"lang": "eng",
"value": "\r A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device.\r This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device.\r "
"value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device."
}
]
},
@ -83,4 +83,4 @@
],
"discovery": "INTERNAL"
}
}
}