mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
53cd593b92
commit
7e4fbb5b62
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ultimum.nl/updates/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ultimum.nl/updates/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://websec.nl/blog/",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ultimum.nl/updates/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ultimum.nl/updates/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://websec.nl/blog/",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@solarwinds.com",
|
||||
"DATE_PUBLIC": "2021-08-20T14:12:00.000Z",
|
||||
"ID": "CVE-2021-32076",
|
||||
"STATE": "PUBLIC",
|
||||
@ -13,18 +13,19 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"product_name": "Web Help Desk",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
"version_affected": "<=",
|
||||
"version_value": "12.7.5"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
"vendor_name": "SolarWinds"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -42,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the \u201cWeb Help Desk Getting Started Wizard\u201d, especially the admin account creationpage, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback."
|
||||
"value": "Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the \u2018Web Help Desk Getting Started Wizard\u2019, especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -71,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "CWE-290 Authentication Bypass by Spoofing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -70,15 +70,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237"
|
||||
},
|
||||
{
|
||||
"name": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -86,4 +86,4 @@
|
||||
"advisory": "23d38099-71cd-42ed-a77a-71e68094adfa",
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user