"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-24 20:00:54 +00:00
parent 0240d06a64
commit b751ab7a6a
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
7 changed files with 255 additions and 24 deletions

View File

@ -116,6 +116,11 @@
"name": "FEDORA-2009-7794",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00750.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163271/Adobe-ColdFusion-8-Remote-Command-Execution.html",
"url": "http://packetstormsecurity.com/files/163271/Adobe-ColdFusion-8-Remote-Command-Execution.html"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-17752",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-17752",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Integer overflow vulnerability in payable function of a smart contract implementation for an Ethereum token, as demonstrated by the smart contract implemented at address 0xB49E984A83d7A638E7F2889fc8328952BA951AbE, an implementation for MillionCoin (MON)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/hellowuzekai/blockchains/blob/master/balance.md",
"refsource": "MISC",
"name": "https://github.com/hellowuzekai/blockchains/blob/master/balance.md"
},
{
"refsource": "MISC",
"name": "https://etherscan.io/address/0xB49E984A83d7A638E7F2889fc8328952BA951AbE",
"url": "https://etherscan.io/address/0xB49E984A83d7A638E7F2889fc8328952BA951AbE"
}
]
}

View File

@ -1,17 +1,91 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-17753",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-17753",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in function addMeByRC in the smart contract implementation for RC, an Ethereum token, allows attackers to transfer an arbitrary amount of tokens to an arbitrary address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/hellowuzekai/blockchains/blob/master/Phishing.md",
"refsource": "MISC",
"name": "https://github.com/hellowuzekai/blockchains/blob/master/Phishing.md"
},
{
"refsource": "MISC",
"name": "https://etherscan.io/address/0x5a50C7D96fC68ea2F0bEE06D86CD971c31F85604",
"url": "https://etherscan.io/address/0x5a50C7D96fC68ea2F0bEE06D86CD971c31F85604"
},
{
"refsource": "MISC",
"name": "https://etherscan.io/address/0x07c1C8c2BCe6290DAA554118b7d208041615CE54",
"url": "https://etherscan.io/address/0x07c1C8c2BCe6290DAA554118b7d208041615CE54"
},
{
"refsource": "MISC",
"name": "https://etherscan.io/address/0x86b784AEF0e9c9A581550bA07fb85B64c780c320",
"url": "https://etherscan.io/address/0x86b784AEF0e9c9A581550bA07fb85B64c780c320"
},
{
"refsource": "MISC",
"name": "https://etherscan.io/address/0x403E518F21F5Ce308085Dcf6637758C61f92446A",
"url": "https://etherscan.io/address/0x403E518F21F5Ce308085Dcf6637758C61f92446A"
},
{
"refsource": "MISC",
"name": "https://etherscan.io/address/0x340DbA127F099DAB9DC8599C75b16e44D9b02Fdb",
"url": "https://etherscan.io/address/0x340DbA127F099DAB9DC8599C75b16e44D9b02Fdb"
},
{
"refsource": "MISC",
"name": "https://etherscan.io/address/0xD7aA007C3e7ab454FFE3E20F0b28F926Db295477",
"url": "https://etherscan.io/address/0xD7aA007C3e7ab454FFE3E20F0b28F926Db295477"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-17759",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-17759",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://evernote.com/intl/zh-cn/security/updates/",
"refsource": "MISC",
"name": "https://evernote.com/intl/zh-cn/security/updates/"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://pastebin.com/F8AuUdck",
"url": "https://pastebin.com/F8AuUdck"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html",
"url": "http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html"
}
]
},

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-35448",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-35448",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://deathflash.ml/blog/remote-mouse-lpe",
"refsource": "MISC",
"name": "https://deathflash.ml/blog/remote-mouse-lpe"
},
{
"url": "https://www.exploit-db.com/exploits/50047",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/50047"
}
]
}