mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a78918410e
commit
699950d927
@ -102,7 +102,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-17563",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-17563",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to \" /index.php?s=/admin-tpl-del&id=\"."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://blog.51cto.com/12653365/2328557",
|
||||
"refsource": "MISC",
|
||||
"name": "http://blog.51cto.com/12653365/2328557"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-17564",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-17564",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to the \" Admin/DataAction.class.php\" component."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://blog.51cto.com/12653365/2328557",
|
||||
"refsource": "MISC",
|
||||
"name": "http://blog.51cto.com/12653365/2328557"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,96 +1,96 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@trendmicro.com",
|
||||
"ID" : "CVE-2020-24556",
|
||||
"STATE" : "PUBLIC"
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@trendmicro.com",
|
||||
"ID": "CVE-2020-24556",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Trend Micro Apex One",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Apex One",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2009 (on premise), SaaS"
|
||||
"version_value": "2009 (on premise), SaaS"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Trend Micro OfficeScan",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro OfficeScan",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "XG SP1"
|
||||
"version_value": "XG SP1"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Trend Micro Worry-Free Business Security",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Worry-Free Business Security",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "10 SP1, Services (SaaS)"
|
||||
"version_value": "10 SP1, Services (SaaS)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Trend Micro"
|
||||
"vendor_name": "Trend Micro"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description" : [
|
||||
"description": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Privilege Escalation"
|
||||
"lang": "eng",
|
||||
"value": "Privilege Escalation"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000263632"
|
||||
"url": "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000263632"
|
||||
},
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000263633",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000263633"
|
||||
"url": "https://success.trendmicro.com/solution/000263633",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000263633"
|
||||
},
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000267260"
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/"
|
||||
"url": "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000267260"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,81 +1,81 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@trendmicro.com",
|
||||
"ID" : "CVE-2020-24557",
|
||||
"STATE" : "PUBLIC"
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@trendmicro.com",
|
||||
"ID": "CVE-2020-24557",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Trend Micro Apex One",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Apex One",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2009 (on premise), SaaS"
|
||||
"version_value": "2009 (on premise), SaaS"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Trend Micro Worry-Free Business Security ",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Worry-Free Business Security ",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "10.0 SP1"
|
||||
"version_value": "10.0 SP1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Trend Micro"
|
||||
"vendor_name": "Trend Micro"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description" : [
|
||||
"description": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Improper Access Control Privilege Escalation"
|
||||
"lang": "eng",
|
||||
"value": "Improper Access Control Privilege Escalation"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000263632"
|
||||
"url": "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000263632"
|
||||
},
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000267260"
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/"
|
||||
"url": "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000267260"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,81 +1,81 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@trendmicro.com",
|
||||
"ID" : "CVE-2020-24558",
|
||||
"STATE" : "PUBLIC"
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@trendmicro.com",
|
||||
"ID": "CVE-2020-24558",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Trend Micro Apex One",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Apex One",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2009 (on premise), SaaS"
|
||||
"version_value": "2009 (on premise), SaaS"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Trend Micro Worry-Free Business Security",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Worry-Free Business Security",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "10.0 SP1, Services (SaaS)"
|
||||
"version_value": "10.0 SP1, Services (SaaS)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Trend Micro"
|
||||
"vendor_name": "Trend Micro"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description" : [
|
||||
"description": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Improper Access Control Privilege Escalation"
|
||||
"lang": "eng",
|
||||
"value": "Improper Access Control Privilege Escalation"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000263632"
|
||||
"url": "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000263632"
|
||||
},
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000267260"
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/"
|
||||
"url": "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000267260"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,81 +1,81 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@trendmicro.com",
|
||||
"ID" : "CVE-2020-24559",
|
||||
"STATE" : "PUBLIC"
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@trendmicro.com",
|
||||
"ID": "CVE-2020-24559",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Trend Micro Apex One",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Apex One",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2009 (on premise), SaaS"
|
||||
"version_value": "2009 (on premise), SaaS"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Trend Micro Worry-Free Business Security",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Worry-Free Business Security",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "10.0 SP1, Services (SaaS)"
|
||||
"version_value": "10.0 SP1, Services (SaaS)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Trend Micro"
|
||||
"vendor_name": "Trend Micro"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description" : [
|
||||
"description": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Hard Link Privilege Escalation"
|
||||
"lang": "eng",
|
||||
"value": "Hard Link Privilege Escalation"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000263632"
|
||||
"url": "https://success.trendmicro.com/solution/000263632",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000263632"
|
||||
},
|
||||
{
|
||||
"url" : "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://success.trendmicro.com/solution/000267260"
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/",
|
||||
"refsource" : "MISC",
|
||||
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/"
|
||||
"url": "https://success.trendmicro.com/solution/000267260",
|
||||
"refsource": "MISC",
|
||||
"name": "https://success.trendmicro.com/solution/000267260"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,16 +56,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5",
|
||||
"name": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/",
|
||||
"name": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5",
|
||||
"name": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt",
|
||||
|
@ -1,62 +1,66 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@trendmicro.com",
|
||||
"ID" : "CVE-2021-28648",
|
||||
"STATE" : "PUBLIC"
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@trendmicro.com",
|
||||
"ID": "CVE-2021-28648",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Trend Micro Antivirus for Mac",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"product_name": "Trend Micro Antivirus for Mac",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2021 (11), 2020 (10.5)"
|
||||
"version_value": "2021 (11), 2020 (10.5)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Trend Micro"
|
||||
"vendor_name": "Trend Micro"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Trend Micro Antivirus for Mac 2020 v10.5 and 2021 v11 (Consumer) is vulnerable to an improper access control privilege escalation vulnerability that could allow an attacker to establish a connection that could lead to full local privilege escalation within the application.\r\n\r\nPlease note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability."
|
||||
"lang": "eng",
|
||||
"value": "Trend Micro Antivirus for Mac 2020 v10.5 and 2021 v11 (Consumer) is vulnerable to an improper access control privilege escalation vulnerability that could allow an attacker to establish a connection that could lead to full local privilege escalation within the application. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description" : [
|
||||
"description": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Improper Access Control"
|
||||
"lang": "eng",
|
||||
"value": "Improper Access Control"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url" : "https://helpcenter.trendmicro.com/en-us/article/TMKA-10293"
|
||||
"url": "https://helpcenter.trendmicro.com/en-us/article/TMKA-10293",
|
||||
"refsource": "MISC",
|
||||
"name": "https://helpcenter.trendmicro.com/en-us/article/TMKA-10293"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-420/"
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-420/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-420/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2008"
|
||||
"ID": "CVE-2021-2008",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2053"
|
||||
"ID": "CVE-2021-2053",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2134"
|
||||
"ID": "CVE-2021-2134",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2135"
|
||||
"ID": "CVE-2021-2135",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -72,8 +73,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2136"
|
||||
"ID": "CVE-2021-2136",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -72,8 +73,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2140"
|
||||
"ID": "CVE-2021-2140",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2141"
|
||||
"ID": "CVE-2021-2141",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2142"
|
||||
"ID": "CVE-2021-2142",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2144"
|
||||
"ID": "CVE-2021-2144",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2145"
|
||||
"ID": "CVE-2021-2145",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2146"
|
||||
"ID": "CVE-2021-2146",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2147"
|
||||
"ID": "CVE-2021-2147",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2149"
|
||||
"ID": "CVE-2021-2149",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2150"
|
||||
"ID": "CVE-2021-2150",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2151"
|
||||
"ID": "CVE-2021-2151",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -68,8 +69,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2152"
|
||||
"ID": "CVE-2021-2152",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -72,8 +73,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2153"
|
||||
"ID": "CVE-2021-2153",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2154"
|
||||
"ID": "CVE-2021-2154",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2155"
|
||||
"ID": "CVE-2021-2155",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2156"
|
||||
"ID": "CVE-2021-2156",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2157"
|
||||
"ID": "CVE-2021-2157",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -72,8 +73,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2158"
|
||||
"ID": "CVE-2021-2158",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2159"
|
||||
"ID": "CVE-2021-2159",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2160"
|
||||
"ID": "CVE-2021-2160",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2161"
|
||||
"ID": "CVE-2021-2161",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -88,8 +89,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2162"
|
||||
"ID": "CVE-2021-2162",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2163"
|
||||
"ID": "CVE-2021-2163",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -88,8 +89,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2164"
|
||||
"ID": "CVE-2021-2164",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2166"
|
||||
"ID": "CVE-2021-2166",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -64,8 +65,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2021-2167"
|
||||
"ID": "CVE-2021-2167",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -60,8 +61,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user