From 9c0f434b00f406359123c923363650a8c8b99825 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 29 Sep 2021 11:00:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/12xxx/CVE-2019-12823.json | 2 +- 2021/24xxx/CVE-2021-24176.json | 139 ++++++++++++----------- 2021/32xxx/CVE-2021-32466.json | 136 ++++++++++++----------- 2021/33xxx/CVE-2021-33923.json | 10 +- 2021/33xxx/CVE-2021-33924.json | 10 +- 2021/35xxx/CVE-2021-35027.json | 70 +++++++++++- 2021/35xxx/CVE-2021-35028.json | 70 +++++++++++- 2021/36xxx/CVE-2021-36745.json | 196 +++++++++++++++++---------------- 2021/3xxx/CVE-2021-3839.json | 18 +++ 9 files changed, 411 insertions(+), 240 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3839.json diff --git a/2019/12xxx/CVE-2019-12823.json b/2019/12xxx/CVE-2019-12823.json index 22042d6bb59..5fd6a822a06 100644 --- a/2019/12xxx/CVE-2019-12823.json +++ b/2019/12xxx/CVE-2019-12823.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Craft CMS 3.1.30 has XSS." + "value": "Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS." } ] }, diff --git a/2021/24xxx/CVE-2021-24176.json b/2021/24xxx/CVE-2021-24176.json index 6e858a0fb22..cdb7eb47e6d 100644 --- a/2021/24xxx/CVE-2021-24176.json +++ b/2021/24xxx/CVE-2021-24176.json @@ -1,75 +1,80 @@ { - "CVE_data_meta": { - "ID": "CVE-2021-24176", - "ASSIGNER": "contact@wpscan.com", - "STATE": "PUBLIC", - "TITLE": "JH 404 Logger <= 1.1 - Unauthenticated Stored Cross-Site Scripting (XSS)" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "generator": "WPScan CVE Generator", - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Unknown", - "product": { - "product_data": [ - { - "product_name": "JH 404 Logger", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_name": "1.1", - "version_value": "1.1" + "CVE_data_meta": { + "ID": "CVE-2021-24176", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "JH 404 Logger <= 1.1 - Unauthenticated Stored Cross-Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "JH 404 Logger", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.1", + "version_value": "1.1" + } + ] + } + } + ] } - ] } - } ] - } } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard." - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585", - "name": "https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "value": "CWE-79 Cross-site Scripting (XSS)", - "lang": "eng" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard." + } ] - } - ] - }, - "credit": [ - { - "lang": "eng", - "value": "Ganesh Bagaria" + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585", + "name": "https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585" + }, + { + "refsource": "MISC", + "name": "https://ganofins.com/blog/my-first-cve-2021-24176/", + "url": "https://ganofins.com/blog/my-first-cve-2021-24176/" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Ganesh Bagaria" + } + ], + "source": { + "discovery": "UNKNOWN" } - ], - "source": { - "discovery": "UNKNOWN" - } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32466.json b/2021/32xxx/CVE-2021-32466.json index 2aa2fc5fa07..5908ff7f1f7 100644 --- a/2021/32xxx/CVE-2021-32466.json +++ b/2021/32xxx/CVE-2021-32466.json @@ -1,66 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2021-32466", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro HouseCall for Home Networks", - "version" : { - "version_data" : [ - { - "version_value" : "5.3.1225 and below" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library.\r\n\r\nPlease note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.\r\n" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "CWE-427: Uncontrolled Search Path Element" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://helpcenter.trendmicro.com/en-us/article/tmka-10626" - }, - { - "url" : "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10621" - }, - { - "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-1112/" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2021-32466", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro HouseCall for Home Networks", + "version": { + "version_data": [ + { + "version_value": "5.3.1225 and below" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427: Uncontrolled Search Path Element" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://helpcenter.trendmicro.com/en-us/article/tmka-10626", + "refsource": "MISC", + "name": "https://helpcenter.trendmicro.com/en-us/article/tmka-10626" + }, + { + "url": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10621", + "refsource": "MISC", + "name": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10621" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1112/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1112/" + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33923.json b/2021/33xxx/CVE-2021-33923.json index 07618d33aeb..c96725e9876 100644 --- a/2021/33xxx/CVE-2021-33923.json +++ b/2021/33xxx/CVE-2021-33923.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "http://confluent.com", - "refsource": "MISC", - "name": "http://confluent.com" - }, { "refsource": "MISC", "name": "https://www.detack.de/en/cve-2021-33923", "url": "https://www.detack.de/en/cve-2021-33923" + }, + { + "refsource": "MISC", + "name": "https://confluent.io", + "url": "https://confluent.io" } ] } diff --git a/2021/33xxx/CVE-2021-33924.json b/2021/33xxx/CVE-2021-33924.json index f6a587c44c0..50eabf36ba9 100644 --- a/2021/33xxx/CVE-2021-33924.json +++ b/2021/33xxx/CVE-2021-33924.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "http://confluent.com", - "refsource": "MISC", - "name": "http://confluent.com" - }, { "refsource": "MISC", "name": "https://www.detack.de/en/cve-2021-33924", "url": "https://www.detack.de/en/cve-2021-33924" + }, + { + "refsource": "MISC", + "name": "https://confluent.io", + "url": "https://confluent.io" } ] } diff --git a/2021/35xxx/CVE-2021-35027.json b/2021/35xxx/CVE-2021-35027.json index c00c6fc7a13..3736bce08ce 100644 --- a/2021/35xxx/CVE-2021-35027.json +++ b/2021/35xxx/CVE-2021-35027.json @@ -1 +1,69 @@ -{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"PSIRT@zyxel.com.tw","ID":"CVE-2021-35027"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Zyxel","product":{"product_data":[{"product_name":"ZyWALL VPN2S Firmware","version":{"version_data":[{"version_value":"1.12(ABLN.0)C0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-27: Path Traversal: 'dir/../../filename'"}]}]},"references":{"reference_data":[{"url":"https://www.zyxel.com/support/Zyxel_security_advisory_for_directory_traversal_and_command_injection_vulnerabilities_of_VPN2S_Firewall.shtml"}]},"impact":{"cvss":{"baseScore":"7.5","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"description":{"description_data":[{"lang":"eng","value":"A directory traversal vulnerability in the web server of the Zyxel VPN2S firmware version 1.12 could allow a remote attacker to gain access to sensitive information."}]}} \ No newline at end of file +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "security@zyxel.com.tw", + "ID": "CVE-2021-35027", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Zyxel", + "product": { + "product_data": [ + { + "product_name": "ZyWALL VPN2S Firmware", + "version": { + "version_data": [ + { + "version_value": "1.12(ABLN.0)C0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-27: Path Traversal: 'dir/../../filename'" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_directory_traversal_and_command_injection_vulnerabilities_of_VPN2S_Firewall.shtml", + "refsource": "MISC", + "name": "https://www.zyxel.com/support/Zyxel_security_advisory_for_directory_traversal_and_command_injection_vulnerabilities_of_VPN2S_Firewall.shtml" + } + ] + }, + "impact": { + "cvss": { + "baseScore": "7.5", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A directory traversal vulnerability in the web server of the Zyxel VPN2S firmware version 1.12 could allow a remote attacker to gain access to sensitive information." + } + ] + } +} \ No newline at end of file diff --git a/2021/35xxx/CVE-2021-35028.json b/2021/35xxx/CVE-2021-35028.json index a9534034d5f..4ae83a3cd1e 100644 --- a/2021/35xxx/CVE-2021-35028.json +++ b/2021/35xxx/CVE-2021-35028.json @@ -1 +1,69 @@ -{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"PSIRT@zyxel.com.tw","ID":"CVE-2021-35028"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Zyxel","product":{"product_data":[{"product_name":"ZyWALL VPN2S Firmware","version":{"version_data":[{"version_value":"1.12(ABLN.0)C0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}]}]},"references":{"reference_data":[{"url":"https://www.zyxel.com/support/Zyxel_security_advisory_for_directory_traversal_and_command_injection_vulnerabilities_of_VPN2S_Firewall.shtml"}]},"impact":{"cvss":{"baseScore":"7.3","vectorString":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}},"description":{"description_data":[{"lang":"eng","value":"A command injection vulnerability in the CGI program of the Zyxel VPN2S firmware version 1.12 could allow an authenticated, local user to execute arbitrary OS commands."}]}} \ No newline at end of file +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "security@zyxel.com.tw", + "ID": "CVE-2021-35028", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Zyxel", + "product": { + "product_data": [ + { + "product_name": "ZyWALL VPN2S Firmware", + "version": { + "version_data": [ + { + "version_value": "1.12(ABLN.0)C0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_directory_traversal_and_command_injection_vulnerabilities_of_VPN2S_Firewall.shtml", + "refsource": "MISC", + "name": "https://www.zyxel.com/support/Zyxel_security_advisory_for_directory_traversal_and_command_injection_vulnerabilities_of_VPN2S_Firewall.shtml" + } + ] + }, + "impact": { + "cvss": { + "baseScore": "7.3", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A command injection vulnerability in the CGI program of the Zyxel VPN2S firmware version 1.12 could allow an authenticated, local user to execute arbitrary OS commands." + } + ] + } +} \ No newline at end of file diff --git a/2021/36xxx/CVE-2021-36745.json b/2021/36xxx/CVE-2021-36745.json index 160bffbfb55..051461f2698 100644 --- a/2021/36xxx/CVE-2021-36745.json +++ b/2021/36xxx/CVE-2021-36745.json @@ -1,96 +1,102 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2021-36745", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro ServerProtect for Storage", - "version" : { - "version_data" : [ - { - "version_value" : "6.0" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for EMC Celerra", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Network Appliance Filers", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - }, - { - "product_name" : "Trend Micro ServerProtect for Microsoft Windows / Novell Netware", - "version" : { - "version_data" : [ - { - "version_value" : "5.8" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.\r\n" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Authentication Bypass" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000289038" - }, - { - "url" : "https://success.trendmicro.com/jp/solution/000289030" - }, - { - "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2021-36745", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro ServerProtect for Storage", + "version": { + "version_data": [ + { + "version_value": "6.0" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for EMC Celerra", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Network Appliance Filers", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + }, + { + "product_name": "Trend Micro ServerProtect for Microsoft Windows / Novell Netware", + "version": { + "version_data": [ + { + "version_value": "5.8" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authentication Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000289038", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000289038" + }, + { + "url": "https://success.trendmicro.com/jp/solution/000289030", + "refsource": "MISC", + "name": "https://success.trendmicro.com/jp/solution/000289030" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3839.json b/2021/3xxx/CVE-2021-3839.json new file mode 100644 index 00000000000..852098e504b --- /dev/null +++ b/2021/3xxx/CVE-2021-3839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file