"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-12 20:03:54 +00:00
parent f71703a703
commit bde7ee23e9
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
60 changed files with 1033 additions and 670 deletions

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-963/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-963/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1814",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1511",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-550/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-550/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -73,6 +73,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "GENTOO",
"name": "GLSA-202004-02",
"url": "https://security.gentoo.org/glsa/202004-02"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -73,6 +73,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -73,6 +73,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -77,6 +77,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0925",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-09",
"url": "https://security.gentoo.org/glsa/202101-09"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-36190",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/sferik/rails_admin/blob/master/README.md",
"refsource": "MISC",
"name": "https://github.com/sferik/rails_admin/blob/master/README.md"
},
{
"url": "https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375",
"refsource": "MISC",
"name": "https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375"
},
{
"url": "https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3",
"refsource": "MISC",
"name": "https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3"
}
]
}
}

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 2.8.0, when the ajax endpoint for the \"excel export\" portal functionality is called directly it allows getting data without scope filtering. This allows a user to access data they which they should not have access to.\n\nThis is fixed in versions 2.7.2 and 3.0.0."
"value": "Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 2.8.0, when the ajax endpoint for the \"excel export\" portal functionality is called directly it allows getting data without scope filtering. This allows a user to access data they which they should not have access to. This is fixed in versions 2.7.2 and 3.0.0."
}
]
},

View File

@ -1,163 +1,165 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1636",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft SQL Server",
"version": {
"version_data": [
{
"version_value": "2012 for 32-bit Systems Service Pack 4 (QFE)"
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1636",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft SQL Server",
"version": {
"version_data": [
{
"version_value": "2012 for 32-bit Systems Service Pack 4 (QFE)"
},
{
"version_value": "2012 for x64-based Systems Service Pack 4 (QFE)"
}
]
}
},
{
"product_name": "Microsoft SQL Server 2017 for x64-based Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2017 for x64-based Systems (CU 22)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2016 Service Pack 2 for x64-based Systems (CU 15)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2019 for x64-based Systems (CU 8)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2019 for x64-based Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
{
"version_value": "2012 for x64-based Systems Service Pack 4 (QFE)"
}
]
"vendor_name": "Microsoft"
}
},
{
"product_name": "Microsoft SQL Server 2017 for x64-based Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2017 for x64-based Systems (CU 22)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2016 Service Pack 2 for x64-based Systems (CU 15)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2019 for x64-based Systems (CU 8)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft SQL Server 2019 for x64-based Systems (GDR)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SQL Elevation of Privilege Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SQL Elevation of Privilege Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636"
}
]
}
}

View File

@ -1,241 +1,243 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows",
"version": {
"version_data": [
{
"version_value": "10 Version 1803 for 32-bit Systems"
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows",
"version": {
"version_data": [
{
"version_value": "10 Version 1803 for 32-bit Systems"
},
{
"version_value": "10 Version 1803 for x64-based Systems"
},
{
"version_value": "10 Version 1803 for ARM64-based Systems"
},
{
"version_value": "10 Version 1809 for 32-bit Systems"
},
{
"version_value": "10 Version 1809 for x64-based Systems"
},
{
"version_value": "10 Version 1809 for ARM64-based Systems"
},
{
"version_value": "10 for 32-bit Systems"
},
{
"version_value": "10 for x64-based Systems"
},
{
"version_value": "10 Version 1607 for 32-bit Systems"
},
{
"version_value": "10 Version 1607 for x64-based Systems"
},
{
"version_value": "8.1 for 32-bit systems"
},
{
"version_value": "8.1 for x64-based systems"
},
{
"version_value": "RT 8.1"
}
]
}
},
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2019 (Core installation)"
},
{
"version_value": "2016"
},
{
"version_value": "2016 (Core installation)"
},
{
"version_value": "2012 R2"
},
{
"version_value": "2012 R2 (Core installation)"
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 1909 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 2004 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 20H2 (Server Core Installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
{
"version_value": "10 Version 1803 for x64-based Systems"
},
{
"version_value": "10 Version 1803 for ARM64-based Systems"
},
{
"version_value": "10 Version 1809 for 32-bit Systems"
},
{
"version_value": "10 Version 1809 for x64-based Systems"
},
{
"version_value": "10 Version 1809 for ARM64-based Systems"
},
{
"version_value": "10 for 32-bit Systems"
},
{
"version_value": "10 for x64-based Systems"
},
{
"version_value": "10 Version 1607 for 32-bit Systems"
},
{
"version_value": "10 Version 1607 for x64-based Systems"
},
{
"version_value": "8.1 for 32-bit systems"
},
{
"version_value": "8.1 for x64-based systems"
},
{
"version_value": "RT 8.1"
}
]
"vendor_name": "Microsoft"
}
},
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2019 (Core installation)"
},
{
"version_value": "2016"
},
{
"version_value": "2016 (Core installation)"
},
{
"version_value": "2012 R2"
},
{
"version_value": "2012 R2 (Core installation)"
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 1909 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 2004 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 20H2 (Server Core Installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows DNS Query Information Disclosure Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows DNS Query Information Disclosure Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637"
}
]
}
}

View File

@ -1,208 +1,210 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1638",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 20H2 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 20H2 (Server Core Installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows",
"version": {
"version_data": [
{
"version_value": "10 Version 1803 for 32-bit Systems"
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1638",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 20H2 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 20H2 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 20H2 (Server Core Installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows",
"version": {
"version_data": [
{
"version_value": "10 Version 1803 for 32-bit Systems"
},
{
"version_value": "10 Version 1803 for x64-based Systems"
},
{
"version_value": "10 Version 1803 for ARM64-based Systems"
},
{
"version_value": "10 Version 1809 for 32-bit Systems"
},
{
"version_value": "10 Version 1809 for x64-based Systems"
},
{
"version_value": "10 Version 1809 for ARM64-based Systems"
}
]
}
},
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2019 (Core installation)"
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 1909 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 2004 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
{
"version_value": "10 Version 1803 for x64-based Systems"
},
{
"version_value": "10 Version 1803 for ARM64-based Systems"
},
{
"version_value": "10 Version 1809 for 32-bit Systems"
},
{
"version_value": "10 Version 1809 for x64-based Systems"
},
{
"version_value": "10 Version 1809 for ARM64-based Systems"
}
]
"vendor_name": "Microsoft"
}
},
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2019 (Core installation)"
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 1909 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 1909 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for ARM64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows 10 Version 2004 for x64-based Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Windows Server, version 2004 (Server Core installation)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Bluetooth Security Feature Bypass Vulnerability This CVE ID is unique from CVE-2021-1683, CVE-2021-1684."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Security Feature Bypass"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Bluetooth Security Feature Bypass Vulnerability This CVE ID is unique from CVE-2021-1683, CVE-2021-1684."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Security Feature Bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638"
}
]
}
}

View File

@ -1,80 +1,82 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1641",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft SharePoint Enterprise Server",
"version": {
"version_data": [
{
"version_value": "2016"
}
]
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-1641",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft SharePoint Enterprise Server",
"version": {
"version_data": [
{
"version_value": "2016"
}
]
}
},
{
"product_name": "Microsoft SharePoint Foundation",
"version": {
"version_data": [
{
"version_value": "2013 Service Pack 1"
}
]
}
},
{
"product_name": "Microsoft SharePoint Server",
"version": {
"version_data": [
{
"version_value": "2019"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
},
{
"product_name": "Microsoft SharePoint Foundation",
"version": {
"version_data": [
{
"version_value": "2013 Service Pack 1"
}
]
}
},
{
"product_name": "Microsoft SharePoint Server",
"version": {
"version_data": [
{
"version_value": "2019"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-1717."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Spoofing"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-1717."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Spoofing"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3135",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}