"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-07-07 15:00:56 +00:00
parent 43c30d0429
commit 4d145c8c8e
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
42 changed files with 597 additions and 124 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-28931",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-28931",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/forkcms/forkcms/releases/tag/5.9.2",
"refsource": "MISC",
"name": "https://github.com/forkcms/forkcms/releases/tag/5.9.2"
},
{
"refsource": "MISC",
"name": "https://github.com/bousalman/ForkCMS-arbitrary-upload/blob/main/README.md",
"url": "https://github.com/bousalman/ForkCMS-arbitrary-upload/blob/main/README.md"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-31925",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-31925",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Pexip Infinity 25.x before 25.4 has Improper Input Validation, and thus an unauthenticated remote attacker can cause a denial of service via the administrative web interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.pexip.com/admin/security_bulletins.htm",
"refsource": "MISC",
"name": "https://docs.pexip.com/admin/security_bulletins.htm"
},
{
"refsource": "CONFIRM",
"name": "https://docs.pexip.com/admin/security_bulletins.htm#CVE-2021-31925",
"url": "https://docs.pexip.com/admin/security_bulletins.htm#CVE-2021-31925"
}
]
}

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4862-f8b86-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4862-f8b86-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4862-f8b86-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4863-57d4a-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4863-57d4a-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4863-57d4a-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4864-94df4-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4864-94df4-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4864-94df4-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4865-0c967-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4865-0c967-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4865-0c967-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4866-b820b-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4866-b820b-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4866-b820b-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4867-9c11c-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4867-9c11c-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4867-9c11c-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4868-75574-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4868-75574-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4868-75574-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4869-714a5-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4869-714a5-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4869-714a5-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4870-83620-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4870-83620-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4870-83620-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4871-2a2d7-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4871-2a2d7-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4871-2a2d7-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4872-fcfa4-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4872-fcfa4-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4872-fcfa4-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4873-6f88b-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4873-6f88b-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4873-6f88b-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4874-79edc-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4874-79edc-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4874-79edc-1.html"
}
]
},

View File

@ -97,8 +97,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4875-692f0-1.html"
}
]
},

View File

@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "Use of hard-coded cryptographic key vulnerability in QSAN Storage Manager allows attackers to obtain users credentials and related permissions."
"value": "Use of hard-coded cryptographic key vulnerability in QSAN Storage Manager allows attackers to obtain users\u2019 credentials and related permissions."
}
]
},
@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4876-8da07-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4876-8da07-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4876-8da07-1.html"
}
]
},

View File

@ -98,8 +98,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4877-7b696-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4877-7b696-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4877-7b696-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "Improper restriction of excessive authentication attempts vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to discover users credentials and obtain access via a brute force attack."
"value": "Improper restriction of excessive authentication attempts vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to discover users\u2019 credentials and obtain access via a brute force attack."
}
]
},
@ -98,8 +98,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4878-0a279-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4878-0a279-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4878-0a279-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4879-01616-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4879-01616-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4879-01616-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4880-e9ce7-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4880-e9ce7-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4880-e9ce7-1.html"
}
]
},

View File

@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrators credential, entering the hard-coded password of the debug mode to execute the restricted system instructions."
"value": "The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator\u2019s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions."
}
]
},
@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4881-959d3-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4881-959d3-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4881-959d3-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4882-c0310-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4882-c0310-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4882-c0310-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4883-aef9d-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4883-aef9d-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4883-aef9d-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4884-fd4cb-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4884-fd4cb-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4884-fd4cb-1.html"
}
]
},

View File

@ -87,8 +87,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4885-b03c8-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4885-b03c8-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4885-b03c8-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4886-d3b14-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4886-d3b14-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4886-d3b14-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4887-ee5e3-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4887-ee5e3-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4887-ee5e3-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4889-23410-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4889-23410-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4889-23410-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html"
}
]
},

View File

@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrators permission and execute arbitrary functions."
"value": "The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator\u2019s permission and execute arbitrary functions."
}
]
},
@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4892-768d9-1.html"
}
]
},

View File

@ -39,7 +39,7 @@
"description_data": [
{
"lang": "eng",
"value": "Realtek HAD contains a driver crashed vulnerability which allows local side attackers to send a special string to the kernel driver in a users mode. Due to unexpected commands, the kernel driver will cause the system crashed.\nA vulnerability in ____COMPONENT____ of Realtek HDA driver allows ____ATTACKER/ATTACK____ to cause ____IMPACT____.\nThis issue affects:\nRealtek HDA driver\n8155 version 9150 and prior versions."
"value": "Realtek HAD contains a driver crashed vulnerability which allows local side attackers to send a special string to the kernel driver in a user\u2019s mode. Due to unexpected commands, the kernel driver will cause the system crashed. A vulnerability in ____COMPONENT____ of Realtek HDA driver allows ____ATTACKER/ATTACK____ to cause ____IMPACT____. This issue affects: Realtek HDA driver 8155 version 9150 and prior versions."
}
]
},
@ -77,8 +77,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4813-7b578-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4813-7b578-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4813-7b578-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4850-9b53f-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4850-9b53f-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4850-9b53f-1.html"
}
]
},

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33215",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-33215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The API allows Directory Traversal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://korelogic.com/advisories.html",
"refsource": "MISC",
"name": "https://korelogic.com/advisories.html"
},
{
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2021/May/76",
"url": "http://seclists.org/fulldisclosure/2021/May/76"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33216",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-33216",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. An Undocumented Backdoor exists, allowing shell access via a developer account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://korelogic.com/advisories.html",
"refsource": "MISC",
"name": "https://korelogic.com/advisories.html"
},
{
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2021/May/78",
"url": "http://seclists.org/fulldisclosure/2021/May/78"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33217",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-33217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The Web Application allows Arbitrary Read/Write actions by authenticated users. The API allows an HTTP POST of arbitrary content into any file on the filesystem as root."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://korelogic.com/advisories.html",
"refsource": "MISC",
"name": "https://korelogic.com/advisories.html"
},
{
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2021/May/77",
"url": "http://seclists.org/fulldisclosure/2021/May/77"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33218",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-33218",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://korelogic.com/advisories.html",
"refsource": "MISC",
"name": "https://korelogic.com/advisories.html"
},
{
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2021/May/74",
"url": "https://seclists.org/fulldisclosure/2021/May/74"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33219",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-33219",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded Web Application Administrator Passwords for the admin and nplus1user accounts."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://korelogic.com/advisories.html",
"refsource": "MISC",
"name": "https://korelogic.com/advisories.html"
},
{
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2021/May/75",
"url": "https://seclists.org/fulldisclosure/2021/May/75"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33220",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-33220",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://korelogic.com/advisories.html",
"refsource": "MISC",
"name": "https://korelogic.com/advisories.html"
},
{
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2021/May/73",
"url": "http://seclists.org/fulldisclosure/2021/May/73"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33221",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-33221",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://korelogic.com/advisories.html",
"refsource": "MISC",
"name": "https://korelogic.com/advisories.html"
},
{
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2021/May/72",
"url": "http://seclists.org/fulldisclosure/2021/May/72"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Istio before 1.9.6 and 1.10.x before 1.10.2 has Incorrect Access Control."
"value": "Istio (1.8.x, 1.9.0-1.9.5 and 1.10.0-1.10.1) contains a remotely exploitable vulnerability where credentials specified in the Gateway and DestinationRule credentialName field can be accessed from different namespaces."
}
]
},