From 8156d85bf725ec0615fc374b7ab746ae12b4e994 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 20 Aug 2021 17:00:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27790.json | 7 ++++- 2021/27xxx/CVE-2021-27792.json | 15 ++++++--- 2021/34xxx/CVE-2021-34207.json | 56 ++++++++++++++++++++++++++++++---- 2021/34xxx/CVE-2021-34215.json | 56 ++++++++++++++++++++++++++++++---- 2021/34xxx/CVE-2021-34218.json | 56 ++++++++++++++++++++++++++++++---- 2021/34xxx/CVE-2021-34220.json | 56 ++++++++++++++++++++++++++++++---- 2021/34xxx/CVE-2021-34223.json | 56 ++++++++++++++++++++++++++++++---- 2021/34xxx/CVE-2021-34228.json | 56 ++++++++++++++++++++++++++++++---- 8 files changed, 316 insertions(+), 42 deletions(-) diff --git a/2021/27xxx/CVE-2021-27790.json b/2021/27xxx/CVE-2021-27790.json index d8b1f7920f9..3baf93c458a 100644 --- a/2021/27xxx/CVE-2021-27790.json +++ b/2021/27xxx/CVE-2021-27790.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210819-0002/", "url": "https://security.netapp.com/advisory/ntap-20210819-0002/" + }, + { + "refsource": "MISC", + "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492", + "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492" } ] }, @@ -60,7 +65,7 @@ "description_data": [ { "lang": "eng", - "value": "The command \u201cipfilter\u201d in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account." + "value": "The command ipfilter in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account." } ] } diff --git a/2021/27xxx/CVE-2021-27792.json b/2021/27xxx/CVE-2021-27792.json index 9fc4cc5ca7f..0bab8079abd 100644 --- a/2021/27xxx/CVE-2021-27792.json +++ b/2021/27xxx/CVE-2021-27792.json @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h" + "version_value": "Brocade Fabric OS versions before v9.0.1a, and v8.2.3a, and v7.4.2h" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "execution of arbitrary code" + "value": "system crash" } ] } @@ -46,13 +46,18 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492", - "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492" + "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1490", + "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1490" }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210819-0002/", "url": "https://security.netapp.com/advisory/ntap-20210819-0002/" + }, + { + "refsource": "MISC", + "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492", + "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492" } ] }, @@ -60,7 +65,7 @@ "description_data": [ { "lang": "eng", - "value": "The command \u201cipfilter\u201d in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account." + "value": "The request handling functions in web management interface of Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h do not properly handle malformed user input, resulting in a service crash. An authenticated attacker could use this weakness to cause the FOS HTTP application handler to crash, requiring a reboot." } ] } diff --git a/2021/34xxx/CVE-2021-34207.json b/2021/34xxx/CVE-2021-34207.json index d5b0f406b5b..8414fc0c933 100644 --- a/2021/34xxx/CVE-2021-34207.json +++ b/2021/34xxx/CVE-2021-34207.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-34207", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-34207", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting in ddns.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the \"Domain Name\" field, \"Server Address\" field, \"User Name/Email\", or \"Password/Key\" field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R", + "refsource": "MISC", + "name": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R" } ] } diff --git a/2021/34xxx/CVE-2021-34215.json b/2021/34xxx/CVE-2021-34215.json index 4f92c9fbf33..20ea778552b 100644 --- a/2021/34xxx/CVE-2021-34215.json +++ b/2021/34xxx/CVE-2021-34215.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-34215", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-34215", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting in tcpipwan.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the \"Service Name\" field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R", + "refsource": "MISC", + "name": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R" } ] } diff --git a/2021/34xxx/CVE-2021-34218.json b/2021/34xxx/CVE-2021-34218.json index 4497d63c53b..72471925bf8 100644 --- a/2021/34xxx/CVE-2021-34218.json +++ b/2021/34xxx/CVE-2021-34218.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-34218", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-34218", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /add/ , /img/, /js/, and /mobile directories via GET Parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R%20Directory%20Indexing", + "refsource": "MISC", + "name": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R%20Directory%20Indexing" } ] } diff --git a/2021/34xxx/CVE-2021-34220.json b/2021/34xxx/CVE-2021-34220.json index 71d729b6c01..67f351d9aa9 100644 --- a/2021/34xxx/CVE-2021-34220.json +++ b/2021/34xxx/CVE-2021-34220.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-34220", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-34220", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting in tr069config.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the \"User Name\" field or \"Password\" field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R", + "refsource": "MISC", + "name": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R" } ] } diff --git a/2021/34xxx/CVE-2021-34223.json b/2021/34xxx/CVE-2021-34223.json index d348ddbfe3e..d70e66f24c9 100644 --- a/2021/34xxx/CVE-2021-34223.json +++ b/2021/34xxx/CVE-2021-34223.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-34223", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-34223", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the \"URL Address\" field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R", + "refsource": "MISC", + "name": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R" } ] } diff --git a/2021/34xxx/CVE-2021-34228.json b/2021/34xxx/CVE-2021-34228.json index 6dc011bc20d..79340f894ef 100644 --- a/2021/34xxx/CVE-2021-34228.json +++ b/2021/34xxx/CVE-2021-34228.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-34228", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-34228", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the \"Description\" field and \"Service Name\" field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R", + "refsource": "MISC", + "name": "https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R" } ] }