"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-10-01 15:01:02 +00:00
parent 391bfead83
commit 4c7cfbc243
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 61 additions and 12 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@esri.com",
"ASSIGNER": "psirt@esri.com",
"DATE_PUBLIC": "2021-07-15T18:34:00.000Z",
"ID": "CVE-2021-29108",
"STATE": "PUBLIC",
@ -39,7 +39,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below that may allow a remote, authenticated attacker to impersonate another account.\n\n\n"
"value": "There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below that may allow a remote, authenticated attacker to impersonate another account."
}
]
},
@ -90,4 +90,4 @@
],
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@esri.com",
"ASSIGNER": "psirt@esri.com",
"DATE_PUBLIC": "2021-07-15T18:35:00.000Z",
"ID": "CVE-2021-29109",
"STATE": "PUBLIC",
@ -39,7 +39,7 @@
"description_data": [
{
"lang": "eng",
"value": "A reflected XSS vulnerability in Esri Portal for ArcGIS version 10.9 and below may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the users browser."
"value": "A reflected XSS vulnerability in Esri Portal for ArcGIS version 10.9 and below may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the user\u2019s browser."
}
]
},
@ -90,4 +90,4 @@
],
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-41647",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-41647",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable \"username\" parameter in login.php and retrieve sensitive database information, as well as add an administrative user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App",
"refsource": "MISC",
"name": "https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App"
},
{
"refsource": "MISC",
"name": "https://github.com/MobiusBinary/CVE-2021-41647",
"url": "https://github.com/MobiusBinary/CVE-2021-41647"
}
]
}