"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-09-01 11:00:52 +00:00
parent a088cdf0c0
commit 67464cf3ba
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
41 changed files with 524 additions and 12 deletions

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9000",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-9000",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in iPortalis iCS 7.1.13.0. Attackers can send a sequence of requests to rapidly cause .NET Input Validation errors. This increases the size of the log file on the remote server until memory is exhausted, therefore consuming the maximum amount of resources (triggering a denial of service condition)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.ultimum.nl/updates/",
"refsource": "MISC",
"name": "https://www.ultimum.nl/updates/"
},
{
"refsource": "MISC",
"name": "https://websec.nl/blog/",
"url": "https://websec.nl/blog/"
},
{
"refsource": "MISC",
"name": "https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/",
"url": "https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/"
}
]
}

View File

@ -1,18 +1,86 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9002",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-9002",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in iPortalis iCS 7.1.13.0. An attacker can gain privileges by intercepting a request and changing UserRoleKey=COMPANY_ADMIN to UserRoleKey=DOMAIN_ADMIN (to achieve Domain Administrator access)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.ultimum.nl/updates/",
"refsource": "MISC",
"name": "https://www.ultimum.nl/updates/"
},
{
"refsource": "MISC",
"name": "https://websec.nl/blog/",
"url": "https://websec.nl/blog/"
},
{
"refsource": "MISC",
"name": "https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/",
"url": "https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:H/PR:L/S:C/UI:N",
"version": "3.0"
}
}
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298"
},
{
"refsource": "DEBIAN",
"name": "DSA-4966",
"url": "https://www.debian.org/security/2021/dsa-4966"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40354",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40355",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40356",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40357",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40358",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40359",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40360",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40361",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40362",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40363",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40364",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40365",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40366",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40367",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-40368",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}