"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-05-04 16:00:49 +00:00
parent 369b38afe3
commit 726ffaba06
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 168 additions and 118 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-21999",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-21999",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php",
"refsource": "MISC",
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php"
},
{
"refsource": "EXPLOIT-DB",
"name": "Exploit Database",
"url": "https://www.exploit-db.com/exploits/47066"
}
]
}

View File

@ -1,93 +1,93 @@
{
"data_type" : "CVE",
"CVE_data_meta" : {
"ID" : "CVE-2020-4987",
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2021-05-03T00:00:00"
},
"impact" : {
"cvssv3" : {
"BM" : {
"SCORE" : "6.400",
"A" : "N",
"I" : "L",
"AC" : "L",
"PR" : "L",
"AV" : "N",
"S" : "C",
"UI" : "N",
"C" : "L"
},
"TM" : {
"RC" : "C",
"E" : "H",
"RL" : "O"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM FlashSystem 900 1.5.2.9 and 1.6.1.3 user management GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192702.",
"lang" : "eng"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross-Site Scripting"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6449280",
"title" : "IBM Security Bulletin 6449280 (FlashSystem 900)",
"url" : "https://www.ibm.com/support/pages/node/6449280"
},
{
"name" : "ibm-flashsystem-cve20204987-xss (192702)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192702",
"title" : "X-Force Vulnerability Report",
"refsource" : "XF"
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "1.6.1.3"
},
{
"version_value" : "1.5.2.9"
}
]
},
"product_name" : "FlashSystem 900"
}
]
}
"data_type": "CVE",
"CVE_data_meta": {
"ID": "CVE-2020-4987",
"STATE": "PUBLIC",
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2021-05-03T00:00:00"
},
"impact": {
"cvssv3": {
"BM": {
"SCORE": "6.400",
"A": "N",
"I": "L",
"AC": "L",
"PR": "L",
"AV": "N",
"S": "C",
"UI": "N",
"C": "L"
},
"TM": {
"RC": "C",
"E": "H",
"RL": "O"
}
]
}
},
"data_format" : "MITRE"
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"value": "IBM FlashSystem 900 1.5.2.9 and 1.6.1.3 user management GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192702.",
"lang": "eng"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-Site Scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6449280",
"title": "IBM Security Bulletin 6449280 (FlashSystem 900)",
"url": "https://www.ibm.com/support/pages/node/6449280"
},
{
"name": "ibm-flashsystem-cve20204987-xss (192702)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192702",
"title": "X-Force Vulnerability Report",
"refsource": "XF"
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "1.6.1.3"
},
{
"version_value": "1.5.2.9"
}
]
},
"product_name": "FlashSystem 900"
}
]
}
}
]
}
},
"data_format": "MITRE"
}

View File

@ -1,10 +1,10 @@
{
"CVE_data_meta": {
"ASSIGNER": "secure@dell.com",
"DATE_PUBLIC": "2021-05-04",
"ID": "CVE-2021-21551",
"ASSIGNER": "secure@dell.com",
"DATE_PUBLIC": "2021-05-04",
"ID": "CVE-2021-21551",
"STATE": "PUBLIC"
},
},
"affects": {
"vendor": {
"vendor_data": [
@ -12,59 +12,60 @@
"product": {
"product_data": [
{
"product_name": "dbutil",
"product_name": "dbutil",
"version": {
"version_data": [
{
"version_affected": "=",
"version_affected": "=",
"version_value": "2.3"
}
]
}
}
]
},
},
"vendor_name": "Dell"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"lang": "eng",
"value": "Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required."
}
]
},
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"lang": "eng",
"value": "CWE-285: Improper Authorization"
}
]
}
]
},
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability"
"refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability",
"name": "https://www.dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability"
}
]
}