"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-02-04 23:01:43 +00:00
parent 81316ff43f
commit 9db2740f21
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
19 changed files with 332 additions and 1406 deletions

View File

@ -74,8 +74,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/000194054" "url": "https://www.dell.com/support/kbdoc/000194054",
"name": "https://www.dell.com/support/kbdoc/000194054"
} }
] ]
} }

View File

@ -63,8 +63,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/000194054" "url": "https://www.dell.com/support/kbdoc/000194054",
"name": "https://www.dell.com/support/kbdoc/000194054"
} }
] ]
} }

View File

@ -63,8 +63,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/000194054" "url": "https://www.dell.com/support/kbdoc/000194054",
"name": "https://www.dell.com/support/kbdoc/000194054"
} }
] ]
} }

View File

@ -74,8 +74,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/000194054" "url": "https://www.dell.com/support/kbdoc/000194054",
"name": "https://www.dell.com/support/kbdoc/000194054"
} }
] ]
} }

View File

@ -74,8 +74,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/000194054" "url": "https://www.dell.com/support/kbdoc/000194054",
"name": "https://www.dell.com/support/kbdoc/000194054"
} }
] ]
} }

View File

@ -74,8 +74,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/000194054" "url": "https://www.dell.com/support/kbdoc/000194054",
"name": "https://www.dell.com/support/kbdoc/000194054"
} }
] ]
} }

View File

@ -13,90 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "VembuBDR", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_value": "n/a"
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0"
},
{
"version_affected": "=",
"version_name": "4.1.x",
"version_value": "4.1.0"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.2"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.1"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.0"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.1 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0"
},
{
"version_affected": "=",
"version_name": "3.8.x",
"version_value": "3.8.0"
},
{
"version_affected": "=",
"version_name": "3.7.x",
"version_value": "3.7.0"
},
{
"version_affected": "=",
"version_name": "3.5.x",
"version_value": "3.5.0.0"
}
]
}
},
{
"product_name": "VembuOffsiteDR ",
"version": {
"version_data": [
{
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_name": "4.2.x",
"version_value": "4.2.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "VembuBDR" "vendor_name": "n/a"
} }
] ]
} }
@ -118,7 +46,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1, the http API located at /sgwebservice_o.php accepts a command argument. Using this command argument an unauthenticated attacker can execute arbitrary shell commands.\n" "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1, the http API located at /sgwebservice_o.php accepts a command argument. Using this command argument an unauthenticated attacker can execute arbitrary shell commands."
} }
] ]
}, },
@ -147,7 +75,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-78 OS Command Injection" "value": "n/a"
} }
] ]
} }

View File

@ -13,91 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "VembuBDR", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_value": "n/a"
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0"
},
{
"version_affected": "=",
"version_name": "4.1.x",
"version_value": "4.1.0"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.2"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.1"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.0"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.1 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0"
},
{
"version_affected": "=",
"version_name": "3.8.x",
"version_value": "3.8.0"
},
{
"version_affected": "=",
"version_name": "3.7.x",
"version_value": "3.7.0"
},
{
"version_affected": "=",
"version_name": "3.5.x",
"version_value": "3.5.0.0"
}
]
}
},
{
"product_name": "VembuOffsiteDR ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_name": "4.2.x",
"version_value": "4.2.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "VembuBDR" "vendor_name": "n/a"
} }
] ]
} }
@ -119,7 +46,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges.\n" "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges."
} }
] ]
}, },
@ -148,7 +75,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-78 OS Command Injection" "value": "n/a"
} }
] ]
} }
@ -156,11 +83,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://csirt.divd.nl/cves/CVE-2021-26472/",
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/cves/CVE-2021-26472/"
},
{ {
"name": "https://csirt.divd.nl/cases/DIVD-2020-00011/", "name": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -175,6 +97,11 @@
"name": "https://www.wbsec.nl/vembu", "name": "https://www.wbsec.nl/vembu",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.wbsec.nl/vembu" "url": "https://www.wbsec.nl/vembu"
},
{
"name": "https://csirt.divd.nl/cves/CVE-2021-26472/",
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/cves/CVE-2021-26472/"
} }
] ]
}, },

View File

@ -13,91 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "VembuBDR", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_value": "n/a"
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0"
},
{
"version_affected": "=",
"version_name": "4.1.x",
"version_value": "4.1.0"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.2"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.1"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.0"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.1 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0"
},
{
"version_affected": "=",
"version_name": "3.8.x",
"version_value": "3.8.0"
},
{
"version_affected": "=",
"version_name": "3.7.x",
"version_value": "3.7.0"
},
{
"version_affected": "=",
"version_name": "3.5.x",
"version_value": "3.5.0.0"
}
]
}
},
{
"product_name": "VembuOffsiteDR ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_name": "4.2.x",
"version_value": "4.2.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "VembuBDR" "vendor_name": "n/a"
} }
] ]
} }
@ -148,7 +75,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type" "value": "n/a"
} }
] ]
} }
@ -156,11 +83,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://csirt.divd.nl/cves/CVE-2021-26473/",
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/cves/CVE-2021-26473/"
},
{ {
"name": "https://csirt.divd.nl/cases/DIVD-2020-00011/", "name": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -175,6 +97,11 @@
"name": "https://www.wbsec.nl/vembu", "name": "https://www.wbsec.nl/vembu",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.wbsec.nl/vembu" "url": "https://www.wbsec.nl/vembu"
},
{
"name": "https://csirt.divd.nl/cves/CVE-2021-26473/",
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/cves/CVE-2021-26473/"
} }
] ]
}, },

View File

@ -13,889 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "VembuBDR", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_value": "n/a"
"version_name": "6.1.x",
"version_value": "6.1.0.0"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0"
},
{
"version_affected": "=",
"version_name": "4.1.x",
"version_value": "4.1.0"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.2"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.1"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.0"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.1 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0 Update1"
},
{
"version_affected": "=",
"version_name": "3.9.x",
"version_value": "3.9.0"
},
{
"version_affected": "=",
"version_name": "3.8.x",
"version_value": "3.8.0"
},
{
"version_affected": "=",
"version_name": "3.7.x",
"version_value": "3.7.0"
},
{
"version_affected": "=",
"version_name": "3.5.x",
"version_value": "3.5.0.0"
}
]
}
},
{
"product_name": "360DR",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "BackSpace",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.5.x",
"version_value": "4.5.0"
}
]
}
},
{
"product_name": "BackupService",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.2.x",
"version_value": "5.2.0"
}
]
}
},
{
"product_name": "BackupSolution",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "BaltnetaOnlineBackup",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.1.x",
"version_value": "4.1.0"
}
]
}
},
{
"product_name": "ClearPointBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "CloudBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "CloudBasedBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0"
}
]
}
},
{
"product_name": "CloudStor ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "CloudStore ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "CtrlSDataAssurance ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.5.x",
"version_value": "4.5.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.2"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0.0"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0"
},
{
"version_affected": "=",
"version_name": "3.5.x",
"version_value": "3.5.0.0"
}
]
}
},
{
"product_name": "DataAddicts ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "DataBackup",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.3.x",
"version_value": "4.3.0"
}
]
}
},
{
"product_name": "DataCrib ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.2.x",
"version_value": "5.2.0"
}
]
}
},
{
"product_name": "DataVault ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
}
]
}
},
{
"product_name": "DBS ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "EclipseBaaS ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "EnklareBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
}
]
}
},
{
"product_name": "FastBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "Guardian ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0"
}
]
}
},
{
"product_name": "HotlinkBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0"
}
]
}
},
{
"product_name": "IronVault ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "iwksbackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.0.x",
"version_value": "5.0.0"
}
]
}
},
{
"product_name": "Level365OnlineBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "LocalTel_RDS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "MBCBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "Netbackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.2.x",
"version_value": "5.2.0"
}
]
}
},
{
"product_name": "NetrepidHostedBackups ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.1"
}
]
}
},
{
"product_name": "OffsiteVAULT ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "OnlineBackup_Client ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0"
}
]
}
},
{
"product_name": "OnyxSync ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "Opusbackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "P2VOnlineBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "ProdigyBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "QloudwiseBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.2"
}
]
}
},
{
"product_name": "RAKVault ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "ReflexBackups ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "RemoteDataRecovery ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
}
]
}
},
{
"product_name": "saf-gate ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "SamcoStor ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.0.x",
"version_value": "5.0.0"
}
]
}
},
{
"product_name": "SM4Store ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "StoreGrid ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.2.x",
"version_value": "5.2.0"
},
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
},
{
"version_affected": "=",
"version_name": "5.0.x",
"version_value": "5.0.0"
},
{
"version_affected": "=",
"version_name": "4.5.x",
"version_value": "4.5.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.1.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.1"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.1.0"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.1"
},
{
"version_affected": "=",
"version_name": "4.0.x",
"version_value": "4.0.0.0"
},
{
"version_affected": "=",
"version_name": "3.5.x",
"version_value": "3.5.0.0"
},
{
"version_affected": "=",
"version_name": "3.1.x",
"version_value": "3.1.0.0"
}
]
}
},
{
"product_name": "StoreSafeDC ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "StorNet ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.0.x",
"version_value": "5.0.0"
},
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0"
}
]
}
},
{
"product_name": "STPOffsite ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "Syntax ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "TBITBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
}
]
}
},
{
"product_name": "TechNetBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "TheDataVault ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.5.x",
"version_value": "4.5.0"
}
]
}
},
{
"product_name": "TitanBackup ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "5.2.x",
"version_value": "5.2.0"
},
{
"version_affected": "=",
"version_name": "5.1.x",
"version_value": "5.1.0"
}
]
}
},
{
"product_name": "TruStor ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
},
{
"version_affected": "=",
"version_name": "3.5.x",
"version_value": "3.5.0.0"
}
]
}
},
{
"product_name": "UndergroundBackups ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "VELOCIsecure ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "VembuOffsiteDR ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0.1"
},
{
"version_affected": "=",
"version_name": "4.2.x",
"version_value": "4.2.0"
}
]
}
},
{
"product_name": "WrightOnline ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "XpressSTOR ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
}
]
}
},
{
"product_name": "ZipData ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.4.x",
"version_value": "4.4.0.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "VembuBDR" "vendor_name": "n/a"
} }
] ]
} }
@ -917,7 +46,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Various Vembu products allow an attacker to execute a (non-blind) http-only Cross Site Request Forgery\n\n(Other products or versions of products in this family may be affected too.)" "value": "Various Vembu products allow an attacker to execute a (non-blind) http-only Cross Site Request Forgery (Other products or versions of products in this family may be affected too.)"
} }
] ]
}, },
@ -946,7 +75,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)" "value": "n/a"
} }
] ]
} }
@ -954,11 +83,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://csirt.divd.nl/cves/CVE-2021-26474/",
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/cves/CVE-2021-26474/"
},
{ {
"name": "https://csirt.divd.nl/cases/DIVD-2020-00011/", "name": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -973,6 +97,11 @@
"name": "https://www.wbsec.nl/vembu", "name": "https://www.wbsec.nl/vembu",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.wbsec.nl/vembu" "url": "https://www.wbsec.nl/vembu"
},
{
"name": "https://csirt.divd.nl/cves/CVE-2021-26474/",
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/cves/CVE-2021-26474/"
} }
] ]
}, },

View File

@ -91,12 +91,13 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://jira.mongodb.org/browse/SERVER-59294" "url": "https://jira.mongodb.org/browse/SERVER-59294",
"name": "https://jira.mongodb.org/browse/SERVER-59294"
} }
] ]
}, },
"source": { "source": {
"discovery": "INTERNAL" "discovery": "INTERNAL"
} }
} }

View File

@ -43,7 +43,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue. " "value": "In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue."
} }
] ]
}, },
@ -68,12 +68,13 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0" "url": "https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0",
"name": "https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0"
} }
] ]
}, },
"source": { "source": {
"discovery": "UNKNOWN" "discovery": "UNKNOWN"
} }
} }

View File

@ -43,7 +43,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue. " "value": "Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue."
} }
] ]
}, },
@ -70,12 +70,13 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://lists.apache.org/thread/3bxf7rbf4zh95r78jtgth6gwhr5fyl2j" "url": "https://lists.apache.org/thread/3bxf7rbf4zh95r78jtgth6gwhr5fyl2j",
"name": "https://lists.apache.org/thread/3bxf7rbf4zh95r78jtgth6gwhr5fyl2j"
} }
] ]
}, },
"source": { "source": {
"discovery": "UNKNOWN" "discovery": "UNKNOWN"
} }
} }

View File

@ -1,106 +1,106 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"DATE_PUBLIC" : "2022-02-02T00:00:00", "DATE_PUBLIC": "2022-02-02T00:00:00",
"ID" : "CVE-2021-38960", "ID": "CVE-2021-38960",
"ASSIGNER" : "psirt@us.ibm.com", "ASSIGNER": "psirt@us.ibm.com",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{
"title" : "IBM Security Bulletin 6529322 (OPENBMC)",
"name" : "https://www.ibm.com/support/pages/node/6529322",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/pages/node/6529322"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/212047",
"refsource" : "XF",
"name" : "ibm-openbmc-cve202138960-info-disc (212047)",
"title" : "X-Force Vulnerability Report"
}
]
},
"description" : {
"description_data" : [
{
"value" : "IBM OPENBMC OP920, OP930, and OP940 could allow an unauthenticated user to obtain sensitive information. IBM X-Force ID: 212047.",
"lang" : "eng"
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{ {
"vendor_name" : "IBM", "title": "IBM Security Bulletin 6529322 (OPENBMC)",
"product" : { "name": "https://www.ibm.com/support/pages/node/6529322",
"product_data" : [ "refsource": "CONFIRM",
{ "url": "https://www.ibm.com/support/pages/node/6529322"
"product_name" : "OPENBMC", },
"version" : { {
"version_data" : [ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/212047",
{ "refsource": "XF",
"version_value" : "OP920" "name": "ibm-openbmc-cve202138960-info-disc (212047)",
}, "title": "X-Force Vulnerability Report"
{
"version_value" : "OP930"
},
{
"version_value" : "OP940"
}
]
}
},
{
"version" : {
"version_data" : [
{
"version_value" : "OP940"
}
]
},
"product_name" : "HMC"
}
]
}
} }
] ]
} },
}, "description": {
"data_type" : "CVE", "description_data": [
"problemtype" : { {
"problemtype_data" : [ "value": "IBM OPENBMC OP920, OP930, and OP940 could allow an unauthenticated user to obtain sensitive information. IBM X-Force ID: 212047.",
{ "lang": "eng"
"description" : [ }
{ ]
"value" : "Obtain Information", },
"lang" : "eng" "affects": {
} "vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "OPENBMC",
"version": {
"version_data": [
{
"version_value": "OP920"
},
{
"version_value": "OP930"
},
{
"version_value": "OP940"
}
]
}
},
{
"version": {
"version_data": [
{
"version_value": "OP940"
}
]
},
"product_name": "HMC"
}
]
}
}
] ]
} }
] },
}, "data_type": "CVE",
"data_version" : "4.0", "problemtype": {
"data_format" : "MITRE", "problemtype_data": [
"impact" : { {
"cvssv3" : { "description": [
"TM" : { {
"RL" : "O", "value": "Obtain Information",
"E" : "U", "lang": "eng"
"RC" : "C" }
}, ]
"BM" : { }
"AV" : "N", ]
"PR" : "N", },
"I" : "N", "data_version": "4.0",
"AC" : "L", "data_format": "MITRE",
"S" : "U", "impact": {
"A" : "N", "cvssv3": {
"UI" : "N", "TM": {
"C" : "L", "RL": "O",
"SCORE" : "5.300" "E": "U",
} "RC": "C"
} },
} "BM": {
} "AV": "N",
"PR": "N",
"I": "N",
"AC": "L",
"S": "U",
"A": "N",
"UI": "N",
"C": "L",
"SCORE": "5.300"
}
}
}
}

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A Cross Site Request Forgery (CSRF) vulnerability exists in Backdrop CMS 1.20, which allows Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading a maliciously add-on with crafted PHP file." "value": "** DISPUTED ** A Cross Site Request Forgery (CSRF) vulnerability exists in Backdrop CMS 1.20, which allows Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading a maliciously add-on with crafted PHP file. NOTE: the vendor disputes this because the attack requires a session cookie of a high-privileged authenticated user who is entitled to install arbitrary add-ons."
} }
] ]
}, },

View File

@ -1,92 +1,93 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@google.com", "ASSIGNER": "security@google.com",
"DATE_PUBLIC": "2022-01-25T13:36:00.000Z", "DATE_PUBLIC": "2022-01-25T13:36:00.000Z",
"ID": "CVE-2022-0317", "ID": "CVE-2022-0317",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Improper Input Validation in AKPublic.Verify in go-attestation" "TITLE": "Improper Input Validation in AKPublic.Verify in go-attestation"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "go-attestation", "product_name": "go-attestation",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.4.0" "version_value": "0.4.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Google LLC" "vendor_name": "Google LLC"
} }
] ]
} }
}, },
"credit": [ "credit": [
{ {
"lang": "eng", "lang": "eng",
"value": "Nikki VonHollen" "value": "Nikki VonHollen"
} }
], ],
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_version": "4.0", "data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An improper input validation vulnerability in go-attestation before 0.3.3 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing AKPublic.Verify to succeed despite the inconsistency. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in Eventlog.Verify to spoof events in the TCG log, hence defeating remotely-attested measured-boot. We recommend upgrading to Version 0.4.0 or above." "value": "An improper input validation vulnerability in go-attestation before 0.3.3 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing AKPublic.Verify to succeed despite the inconsistency. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in Eventlog.Verify to spoof events in the TCG log, hence defeating remotely-attested measured-boot. We recommend upgrading to Version 0.4.0 or above."
} }
] ]
}, },
"generator": { "generator": {
"engine": "Vulnogram 0.0.9" "engine": "Vulnogram 0.0.9"
}, },
"impact": { "impact": {
"cvss": { "cvss": {
"attackComplexity": "LOW", "attackComplexity": "LOW",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"availabilityImpact": "NONE", "availabilityImpact": "NONE",
"baseScore": 4, "baseScore": 4,
"baseSeverity": "MEDIUM", "baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE", "confidentialityImpact": "NONE",
"integrityImpact": "LOW", "integrityImpact": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"userInteraction": "NONE", "userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1" "version": "3.1"
} }
}, },
"problemtype": { "problemtype": {
"problemtype_data": [ "problemtype_data": [
{ {
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-20 Improper Input Validation" "value": "CWE-20 Improper Input Validation"
} }
] ]
} }
] ]
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p" "url": "https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p",
} "name": "https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p"
] }
}, ]
"source": { },
"discovery": "INTERNAL" "source": {
} "discovery": "INTERNAL"
} }
}

View File

@ -35,7 +35,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize image file paths leading to OS level command injection. This issue has been patched in commit cdcd48b. Users are advised to upgrade.\n" "value": "iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize image file paths leading to OS level command injection. This issue has been patched in commit cdcd48b. Users are advised to upgrade."
} }
] ]
}, },

View File

@ -1,63 +1,67 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "security@trendmicro.com", "ASSIGNER": "security@trendmicro.com",
"ID" : "CVE-2022-23805", "ID": "CVE-2022-23805",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Trend Micro Worry-Free Business Security", "product_name": "Trend Micro Worry-Free Business Security",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "10.0 SP1" "version_value": "10.0 SP1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Trend Micro" "vendor_name": "Trend Micro"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "A security out-of-bounds read information disclosure vulnerability in Trend Micro Worry-Free Business Security Server could allow a local attacker to send garbage data to a specific named pipe and crash the server.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." "value": "A security out-of-bounds read information disclosure vulnerability in Trend Micro Worry-Free Business Security Server could allow a local attacker to send garbage data to a specific named pipe and crash the server. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Out-Of-Bounds Read Information Disclosure" "value": "Out-Of-Bounds Read Information Disclosure"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"url" : "https://success.trendmicro.com/solution/000290416" "url": "https://success.trendmicro.com/solution/000290416",
}, "refsource": "MISC",
{ "name": "https://success.trendmicro.com/solution/000290416"
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-22-147/" },
} {
] "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-147/",
} "refsource": "MISC",
} "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-147/"
}
]
}
}

View File

@ -67,8 +67,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2" "url": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2",
"name": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2"
} }
] ]
}, },
@ -82,4 +83,4 @@
"value": "Upgrade to Apache ActiveMQ Artemis 2.20.0 or 2.19.1 (if you're still using Java 8)." "value": "Upgrade to Apache ActiveMQ Artemis 2.20.0 or 2.19.1 (if you're still using Java 8)."
} }
] ]
} }