"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-25 12:00:54 +00:00
parent 652a031c23
commit a6bc72dfb8
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 578 additions and 36 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-28958",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-28958",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Zoho ManageEngine ADSelfService Plus through 6101 is vulnerable to unauthenticated Remote Code Execution while changing the password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.manageengine.com",
"refsource": "MISC",
"name": "https://www.manageengine.com"
},
{
"refsource": "MISC",
"name": "https://www.manageengine.com/products/self-service-password/release-notes.html#6102",
"url": "https://www.manageengine.com/products/self-service-password/release-notes.html#6102"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-31615",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-31615",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 may permit an adjacent device to inject a crafted packet during the receive window of the listening device before the transmitting device initiates its packet transmission to achieve full MITM status without terminating the link. When applied against devices establishing or using encrypted links, crafted packets may be used to terminate an existing link, but will not compromise the confidentiality or integrity of the link."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bluetooth.com",
"refsource": "MISC",
"name": "https://bluetooth.com"
},
{
"refsource": "MISC",
"name": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/injectable/",
"url": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/injectable/"
}
]
}

View File

@ -1,18 +1,132 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@fidelissecurity.com",
"DATE_PUBLIC": "2021-06-18T21:30:00.000Z",
"ID": "CVE-2021-35047",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Privileged Command Injection Vulnerability in Fidelis Network and Deception"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Fidelis Network",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Network",
"version_value": "9.3.7"
},
{
"platform": "CentOS",
"version_affected": "=",
"version_name": "Fidelis Network",
"version_value": "9.4"
}
]
}
},
{
"product_name": "Fidelis Deception",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Deception",
"version_value": "9.3.7"
},
{
"platform": "CentOS",
"version_affected": "=",
"version_name": "Fidelis Deception",
"version_value": "9.4"
}
]
}
}
]
},
"vendor_name": "Fidelis Cybersecurity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Ryan Wincey(@rwincey) & Brandon Peterson(@Barbarisch926), Securifera"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Vulnerability in the CommandPost, Collector, and Sensor components of Fidelis Network and Deception enables an attacker with user level access to the CLI to inject root level commands into the component and neighboring Fidelis components. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates are available to address this vulnerability."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Root level access"
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies",
"refsource": "CONFIRM",
"url": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to version 9.3.7 or version 9.4.1.\nOr apply patches to version 9.3.6 or version 9.4."
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,132 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@fidelissecurity.com",
"DATE_PUBLIC": "2021-06-18T21:30:00.000Z",
"ID": "CVE-2021-35048",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Unauthenticated SQL Injection Vulnerability in Fidelis Network and Deception"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Fidelis Network",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Network",
"version_value": "9.3.7"
},
{
"platform": "CentOS",
"version_affected": "=",
"version_name": "Fidelis Network",
"version_value": "9.4"
}
]
}
},
{
"product_name": "Fidelis Deception",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Deception",
"version_value": "9.3.7"
},
{
"platform": "CentOS",
"version_affected": "=",
"version_name": "Fidelis Deception",
"version_value": "9.4"
}
]
}
}
]
},
"vendor_name": "Fidelis Cybersecurity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Ryan Wincey(@rwincey), Securifera"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Vulnerability in Fidelis Network and Deception CommandPost enables unauthenticated SQL injection through the web interface. The vulnerability could lead to exposure of authentication tokens in some versions of Fidelis software. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates are available to address this vulnerability."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "SQL Injection"
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies",
"refsource": "CONFIRM",
"url": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to version 9.3.7 or version 9.4.1.\nOr apply patches to version 9.3.6 or version 9.4."
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,132 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@fidelissecurity.com",
"DATE_PUBLIC": "2021-06-18T21:30:00.000Z",
"ID": "CVE-2021-35049",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Command Injection Vulnerability in Fidelis Network and Deception"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Fidelis Network",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Network",
"version_value": "9.3.7"
},
{
"platform": "CentOS",
"version_affected": "=",
"version_name": "Fidelis Network",
"version_value": "9.4"
}
]
}
},
{
"product_name": "Fidelis Deception",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Deception",
"version_value": "9.3.7"
},
{
"platform": "CentOS",
"version_affected": "=",
"version_name": "Fidelis Deception",
"version_value": "9.4"
}
]
}
}
]
},
"vendor_name": "Fidelis Cybersecurity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Ryan Wincey(@rwincey), Securifera"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection through the web interface. The vulnerability could allow a specially crafted HTTP request to execute system commands on the CommandPost and return results in an HTTP response in an authenticated session. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates are available to address this vulnerability."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Command Injection"
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies",
"refsource": "CONFIRM",
"url": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to version 9.3.7 or version 9.4.1.\nOr apply patches to version 9.3.6 or version 9.4."
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,120 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@fidelissecurity.com",
"DATE_PUBLIC": "2021-06-18T21:30:00.000Z",
"ID": "CVE-2021-35050",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "User Credentials Stored in a Recoverable Format within Fidelis Network and Deception"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Fidelis Network",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Network",
"version_value": "9.3.3"
}
]
}
},
{
"product_name": "Fidelis Deception",
"version": {
"version_data": [
{
"platform": "CentOS",
"version_affected": "<",
"version_name": "Fidelis Deception",
"version_value": "9.3.3"
}
]
}
}
]
},
"vendor_name": "Fidelis Cybersecurity"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Ryan Wincey(@rwincey) & Brandon Peterson(@Barbarisch926), Securifera"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "User credentials stored in a recoverable format within Fidelis Network and Deception CommandPost. In the event that an attacker gains access to the CommandPost, these values could be decoded and used to login to the application. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.3. This vulnerability has been addressed in version 9.3.3 and subsequent versions."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Command Injection"
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-257 Storing Passwords in a Recoverable Format"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies",
"refsource": "CONFIRM",
"url": "https://support.fidelissecurity.com/hc/en-us/categories/360001842694-Advisories-News-and-Policies"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to version 9.3.7 or version 9.4.1.\nOr apply patches to version 9.3.6 or version 9.4."
}
],
"source": {
"discovery": "EXTERNAL"
}
}