diff --git a/2021/26xxx/CVE-2021-26543.json b/2021/26xxx/CVE-2021-26543.json index aa8a178420e..f3077a61b31 100644 --- a/2021/26xxx/CVE-2021-26543.json +++ b/2021/26xxx/CVE-2021-26543.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The \"gitDiff\" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability." + "value": "The \"gitDiff\" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. The issue has been resolved in version 1.0.5." } ] }, diff --git a/2021/33xxx/CVE-2021-33555.json b/2021/33xxx/CVE-2021-33555.json index 5f4372bf60c..ae260a17108 100644 --- a/2021/33xxx/CVE-2021-33555.json +++ b/2021/33xxx/CVE-2021-33555.json @@ -56,7 +56,7 @@ "description_data": [ { "lang": "eng", - "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.\n\n" + "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server." } ] }, diff --git a/2021/34xxx/CVE-2021-34559.json b/2021/34xxx/CVE-2021-34559.json index ab7c2ece825..2880fd9e721 100644 --- a/2021/34xxx/CVE-2021-34559.json +++ b/2021/34xxx/CVE-2021-34559.json @@ -56,7 +56,7 @@ "description_data": [ { "lang": "eng", - "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.\n\n" + "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings." } ] }, diff --git a/2021/34xxx/CVE-2021-34561.json b/2021/34xxx/CVE-2021-34561.json index 16faa20e7a8..cd8ef9db122 100644 --- a/2021/34xxx/CVE-2021-34561.json +++ b/2021/34xxx/CVE-2021-34561.json @@ -56,7 +56,7 @@ "description_data": [ { "lang": "eng", - "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser." + "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser." } ] }, diff --git a/2021/34xxx/CVE-2021-34562.json b/2021/34xxx/CVE-2021-34562.json index f467fe22b3b..cb5a907eac4 100644 --- a/2021/34xxx/CVE-2021-34562.json +++ b/2021/34xxx/CVE-2021-34562.json @@ -56,7 +56,7 @@ "description_data": [ { "lang": "eng", - "value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response." + "value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response." } ] }, diff --git a/2021/34xxx/CVE-2021-34563.json b/2021/34xxx/CVE-2021-34563.json index 9ecfe41fcec..c34e09af026 100644 --- a/2021/34xxx/CVE-2021-34563.json +++ b/2021/34xxx/CVE-2021-34563.json @@ -66,7 +66,7 @@ "description_data": [ { "lang": "eng", - "value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.\n\n" + "value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript." } ] }, diff --git a/2021/34xxx/CVE-2021-34564.json b/2021/34xxx/CVE-2021-34564.json index bf5ce244d44..79145664f49 100644 --- a/2021/34xxx/CVE-2021-34564.json +++ b/2021/34xxx/CVE-2021-34564.json @@ -56,7 +56,7 @@ "description_data": [ { "lang": "eng", - "value": "Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.\n\n" + "value": "Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9." } ] }, diff --git a/2021/34xxx/CVE-2021-34565.json b/2021/34xxx/CVE-2021-34565.json index 996d5043ca9..a36a8acddfe 100644 --- a/2021/34xxx/CVE-2021-34565.json +++ b/2021/34xxx/CVE-2021-34565.json @@ -66,7 +66,7 @@ "description_data": [ { "lang": "eng", - "value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.\n\n\n\n" + "value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials." } ] },