"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-04-22 22:00:48 +00:00
parent a78918410e
commit 699950d927
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
39 changed files with 2707 additions and 2523 deletions

View File

@ -102,7 +102,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-17563",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-17563",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to \" /index.php?s=/admin-tpl-del&id=\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://blog.51cto.com/12653365/2328557",
"refsource": "MISC",
"name": "http://blog.51cto.com/12653365/2328557"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-17564",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-17564",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to the \" Admin/DataAction.class.php\" component."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://blog.51cto.com/12653365/2328557",
"refsource": "MISC",
"name": "http://blog.51cto.com/12653365/2328557"
}
]
}

View File

@ -1,96 +1,96 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@trendmicro.com",
"ID" : "CVE-2020-24556",
"STATE" : "PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2020-24556",
"STATE": "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"affects": {
"vendor": {
"vendor_data": [
{
"product" : {
"product_data" : [
"product": {
"product_data": [
{
"product_name" : "Trend Micro Apex One",
"version" : {
"version_data" : [
"product_name": "Trend Micro Apex One",
"version": {
"version_data": [
{
"version_value" : "2009 (on premise), SaaS"
"version_value": "2009 (on premise), SaaS"
}
]
}
},
{
"product_name" : "Trend Micro OfficeScan",
"version" : {
"version_data" : [
"product_name": "Trend Micro OfficeScan",
"version": {
"version_data": [
{
"version_value" : "XG SP1"
"version_value": "XG SP1"
}
]
}
},
{
"product_name" : "Trend Micro Worry-Free Business Security",
"version" : {
"version_data" : [
"product_name": "Trend Micro Worry-Free Business Security",
"version": {
"version_data": [
{
"version_value" : "10 SP1, Services (SaaS)"
"version_value": "10 SP1, Services (SaaS)"
}
]
}
}
]
},
"vendor_name" : "Trend Micro"
"vendor_name": "Trend Micro"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang" : "eng",
"value" : "A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
"lang": "eng",
"value": "A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
}
]
},
"problemtype" : {
"problemtype_data" : [
"problemtype": {
"problemtype_data": [
{
"description" : [
"description": [
{
"lang" : "eng",
"value" : "Privilege Escalation"
"lang": "eng",
"value": "Privilege Escalation"
}
]
}
]
},
"references" : {
"reference_data" : [
"references": {
"reference_data": [
{
"url" : "https://success.trendmicro.com/solution/000263632",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000263632"
"url": "https://success.trendmicro.com/solution/000263632",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000263632"
},
{
"url" : "https://success.trendmicro.com/solution/000263633",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000263633"
"url": "https://success.trendmicro.com/solution/000263633",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000263633"
},
{
"url" : "https://success.trendmicro.com/solution/000267260",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000267260"
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/"
},
{
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/",
"refsource" : "MISC",
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/"
"url": "https://success.trendmicro.com/solution/000267260",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000267260"
}
]
}

View File

@ -1,81 +1,81 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@trendmicro.com",
"ID" : "CVE-2020-24557",
"STATE" : "PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2020-24557",
"STATE": "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"affects": {
"vendor": {
"vendor_data": [
{
"product" : {
"product_data" : [
"product": {
"product_data": [
{
"product_name" : "Trend Micro Apex One",
"version" : {
"version_data" : [
"product_name": "Trend Micro Apex One",
"version": {
"version_data": [
{
"version_value" : "2009 (on premise), SaaS"
"version_value": "2009 (on premise), SaaS"
}
]
}
},
{
"product_name" : "Trend Micro Worry-Free Business Security ",
"version" : {
"version_data" : [
"product_name": "Trend Micro Worry-Free Business Security ",
"version": {
"version_data": [
{
"version_value" : "10.0 SP1"
"version_value": "10.0 SP1"
}
]
}
}
]
},
"vendor_name" : "Trend Micro"
"vendor_name": "Trend Micro"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang" : "eng",
"value" : "A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
"lang": "eng",
"value": "A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
}
]
},
"problemtype" : {
"problemtype_data" : [
"problemtype": {
"problemtype_data": [
{
"description" : [
"description": [
{
"lang" : "eng",
"value" : "Improper Access Control Privilege Escalation"
"lang": "eng",
"value": "Improper Access Control Privilege Escalation"
}
]
}
]
},
"references" : {
"reference_data" : [
"references": {
"reference_data": [
{
"url" : "https://success.trendmicro.com/solution/000263632",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000263632"
"url": "https://success.trendmicro.com/solution/000263632",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000263632"
},
{
"url" : "https://success.trendmicro.com/solution/000267260",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000267260"
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/"
},
{
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/",
"refsource" : "MISC",
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/"
"url": "https://success.trendmicro.com/solution/000267260",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000267260"
}
]
}

View File

@ -1,81 +1,81 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@trendmicro.com",
"ID" : "CVE-2020-24558",
"STATE" : "PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2020-24558",
"STATE": "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"affects": {
"vendor": {
"vendor_data": [
{
"product" : {
"product_data" : [
"product": {
"product_data": [
{
"product_name" : "Trend Micro Apex One",
"version" : {
"version_data" : [
"product_name": "Trend Micro Apex One",
"version": {
"version_data": [
{
"version_value" : "2009 (on premise), SaaS"
"version_value": "2009 (on premise), SaaS"
}
]
}
},
{
"product_name" : "Trend Micro Worry-Free Business Security",
"version" : {
"version_data" : [
"product_name": "Trend Micro Worry-Free Business Security",
"version": {
"version_data": [
{
"version_value" : "10.0 SP1, Services (SaaS)"
"version_value": "10.0 SP1, Services (SaaS)"
}
]
}
}
]
},
"vendor_name" : "Trend Micro"
"vendor_name": "Trend Micro"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang" : "eng",
"value" : "A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
"lang": "eng",
"value": "A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
"problemtype": {
"problemtype_data": [
{
"description" : [
"description": [
{
"lang" : "eng",
"value" : "Improper Access Control Privilege Escalation"
"lang": "eng",
"value": "Improper Access Control Privilege Escalation"
}
]
}
]
},
"references" : {
"reference_data" : [
"references": {
"reference_data": [
{
"url" : "https://success.trendmicro.com/solution/000263632",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000263632"
"url": "https://success.trendmicro.com/solution/000263632",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000263632"
},
{
"url" : "https://success.trendmicro.com/solution/000267260",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000267260"
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/"
},
{
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/",
"refsource" : "MISC",
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/"
"url": "https://success.trendmicro.com/solution/000267260",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000267260"
}
]
}

View File

@ -1,81 +1,81 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@trendmicro.com",
"ID" : "CVE-2020-24559",
"STATE" : "PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2020-24559",
"STATE": "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"affects": {
"vendor": {
"vendor_data": [
{
"product" : {
"product_data" : [
"product": {
"product_data": [
{
"product_name" : "Trend Micro Apex One",
"version" : {
"version_data" : [
"product_name": "Trend Micro Apex One",
"version": {
"version_data": [
{
"version_value" : "2009 (on premise), SaaS"
"version_value": "2009 (on premise), SaaS"
}
]
}
},
{
"product_name" : "Trend Micro Worry-Free Business Security",
"version" : {
"version_data" : [
"product_name": "Trend Micro Worry-Free Business Security",
"version": {
"version_data": [
{
"version_value" : "10.0 SP1, Services (SaaS)"
"version_value": "10.0 SP1, Services (SaaS)"
}
]
}
}
]
},
"vendor_name" : "Trend Micro"
"vendor_name": "Trend Micro"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang" : "eng",
"value" : "A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
"lang": "eng",
"value": "A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
"problemtype": {
"problemtype_data": [
{
"description" : [
"description": [
{
"lang" : "eng",
"value" : "Hard Link Privilege Escalation"
"lang": "eng",
"value": "Hard Link Privilege Escalation"
}
]
}
]
},
"references" : {
"reference_data" : [
"references": {
"reference_data": [
{
"url" : "https://success.trendmicro.com/solution/000263632",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000263632"
"url": "https://success.trendmicro.com/solution/000263632",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000263632"
},
{
"url" : "https://success.trendmicro.com/solution/000267260",
"refsource" : "MISC",
"name" : "https://success.trendmicro.com/solution/000267260"
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/"
},
{
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/",
"refsource" : "MISC",
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/"
"url": "https://success.trendmicro.com/solution/000267260",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000267260"
}
]
}

View File

@ -56,16 +56,16 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5",
"name": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5"
},
{
"refsource": "MISC",
"url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/",
"name": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/"
},
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5",
"name": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5"
},
{
"refsource": "MISC",
"url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt",

View File

@ -1,62 +1,66 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@trendmicro.com",
"ID" : "CVE-2021-28648",
"STATE" : "PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2021-28648",
"STATE": "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"affects": {
"vendor": {
"vendor_data": [
{
"product" : {
"product_data" : [
"product": {
"product_data": [
{
"product_name" : "Trend Micro Antivirus for Mac",
"version" : {
"version_data" : [
"product_name": "Trend Micro Antivirus for Mac",
"version": {
"version_data": [
{
"version_value" : "2021 (11), 2020 (10.5)"
"version_value": "2021 (11), 2020 (10.5)"
}
]
}
}
]
},
"vendor_name" : "Trend Micro"
"vendor_name": "Trend Micro"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang" : "eng",
"value" : "Trend Micro Antivirus for Mac 2020 v10.5 and 2021 v11 (Consumer) is vulnerable to an improper access control privilege escalation vulnerability that could allow an attacker to establish a connection that could lead to full local privilege escalation within the application.\r\n\r\nPlease note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability."
"lang": "eng",
"value": "Trend Micro Antivirus for Mac 2020 v10.5 and 2021 v11 (Consumer) is vulnerable to an improper access control privilege escalation vulnerability that could allow an attacker to establish a connection that could lead to full local privilege escalation within the application. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
"problemtype": {
"problemtype_data": [
{
"description" : [
"description": [
{
"lang" : "eng",
"value" : "Improper Access Control"
"lang": "eng",
"value": "Improper Access Control"
}
]
}
]
},
"references" : {
"reference_data" : [
"references": {
"reference_data": [
{
"url" : "https://helpcenter.trendmicro.com/en-us/article/TMKA-10293"
"url": "https://helpcenter.trendmicro.com/en-us/article/TMKA-10293",
"refsource": "MISC",
"name": "https://helpcenter.trendmicro.com/en-us/article/TMKA-10293"
},
{
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-420/"
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-420/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-420/"
}
]
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2008"
"ID": "CVE-2021-2008",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2053"
"ID": "CVE-2021-2053",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2134"
"ID": "CVE-2021-2134",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2135"
"ID": "CVE-2021-2135",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -72,8 +73,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2136"
"ID": "CVE-2021-2136",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -72,8 +73,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2140"
"ID": "CVE-2021-2140",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2141"
"ID": "CVE-2021-2141",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2142"
"ID": "CVE-2021-2142",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2144"
"ID": "CVE-2021-2144",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2145"
"ID": "CVE-2021-2145",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2146"
"ID": "CVE-2021-2146",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2147"
"ID": "CVE-2021-2147",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2149"
"ID": "CVE-2021-2149",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2150"
"ID": "CVE-2021-2150",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2151"
"ID": "CVE-2021-2151",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -68,8 +69,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2152"
"ID": "CVE-2021-2152",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -72,8 +73,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2153"
"ID": "CVE-2021-2153",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2154"
"ID": "CVE-2021-2154",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2155"
"ID": "CVE-2021-2155",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2156"
"ID": "CVE-2021-2156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2157"
"ID": "CVE-2021-2157",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -72,8 +73,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2158"
"ID": "CVE-2021-2158",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2159"
"ID": "CVE-2021-2159",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2160"
"ID": "CVE-2021-2160",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2161"
"ID": "CVE-2021-2161",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -88,8 +89,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2162"
"ID": "CVE-2021-2162",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2163"
"ID": "CVE-2021-2163",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -88,8 +89,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2164"
"ID": "CVE-2021-2164",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2166"
"ID": "CVE-2021-2166",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -64,8 +65,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}

View File

@ -1,10 +1,11 @@
{
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2167"
"ID": "CVE-2021-2167",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -60,8 +61,10 @@
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
}
]
}
}
}