"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-08-26 18:01:01 +00:00
parent 58a040017c
commit cd11f67696
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
24 changed files with 657 additions and 263 deletions

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18467",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18467",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross Site Scripting (XSS) vulnerabilty exists in BigTree-CMS 4.4.3 in the tag name field found in the Tags page under the General menu via a crafted website name by doing an authenticated POST HTTP request to admin/tags/create."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/bigtreecms/BigTree-CMS/issues/364",
"refsource": "MISC",
"name": "https://github.com/bigtreecms/BigTree-CMS/issues/364"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18468",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18468",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross Site Scripting (XSS) vulnerability exists in qdPM 9.1 in the Heading field found in the Login Page page under the General menu via a crafted website name by doing an authenticated POST HTTP request to /qdPM_9.1/index.php/configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/2",
"refsource": "MISC",
"name": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/2"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18469",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18469",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting (XSS) vulnerability in the Copyright Text field found in the Application page under the Configuration menu in Rukovoditel 2.4.1 allows remote attackers to inject arbitrary web script or HTML via a crafted website name by doing an authenticated POST HTTP request to /rukovoditel_2.4.1/index.php?module=configuration/save&redirect_to=configuration/application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/3",
"refsource": "MISC",
"name": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/3"
},
{
"refsource": "MISC",
"name": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/5",
"url": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/5"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18470",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18470",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting (XSS) vulnerability in the Name of application field found in the General Configuration page in Rukovoditel 2.4.1 allows remote attackers to inject arbitrary web script or HTML via a crafted website name by doing an authenticated POST HTTP request to rukovoditel_2.4.1/install/index.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/3",
"refsource": "MISC",
"name": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/3"
},
{
"refsource": "MISC",
"name": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/4",
"url": "https://github.com/joelister/Persistent-XSS-on-qdPM-9.1/issues/4"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18475",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18475",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross Site Scripting (XSS) vulnerabilty exists in Hucart CMS 5.7.4 is via the mes_title field. The first user inserts a malicious script into the header field of the outbox and sends it to other users. When other users open the email, the malicious code will be executed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/joelister/bug/issues/7",
"refsource": "MISC",
"name": "https://github.com/joelister/bug/issues/7"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18476",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18476",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SQL Injection vulnerability in Hucart CMS 5.7.4 via the basic information field found in the avatar usd_image field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/joelister/bug/issues/9",
"refsource": "MISC",
"name": "https://github.com/joelister/bug/issues/9"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18477",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18477",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SQL Injection vulnerability in Hucart CMS 5.7.4 via the purchase enquiry field found in the Message con_content field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/joelister/bug/issues/8",
"refsource": "MISC",
"name": "https://github.com/joelister/bug/issues/8"
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30590",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1227777"
"url": "https://crbug.com/1227777",
"refsource": "MISC",
"name": "https://crbug.com/1227777"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30591",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1229298"
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
"url": "https://crbug.com/1229298",
"refsource": "MISC",
"name": "https://crbug.com/1229298"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30592",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1209469"
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
"url": "https://crbug.com/1209469",
"refsource": "MISC",
"name": "https://crbug.com/1209469"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30593",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1209616"
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
"url": "https://crbug.com/1209616",
"refsource": "MISC",
"name": "https://crbug.com/1209616"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30594",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1218468"
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
"url": "https://crbug.com/1218468",
"refsource": "MISC",
"name": "https://crbug.com/1218468"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30596",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1214481"
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
"url": "https://crbug.com/1214481",
"refsource": "MISC",
"name": "https://crbug.com/1214481"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30597",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1232617"
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html"
"url": "https://crbug.com/1232617",
"refsource": "MISC",
"name": "https://crbug.com/1232617"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30598",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1234764"
"url": "https://crbug.com/1234764",
"refsource": "MISC",
"name": "https://crbug.com/1234764"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30599",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1234770"
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1234770",
"refsource": "MISC",
"name": "https://crbug.com/1234770"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30600",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1231134"
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1231134",
"refsource": "MISC",
"name": "https://crbug.com/1231134"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30601",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1234009"
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1234009",
"refsource": "MISC",
"name": "https://crbug.com/1234009"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30602",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1230767"
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1230767",
"refsource": "MISC",
"name": "https://crbug.com/1230767"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30603",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1233564"
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1233564",
"refsource": "MISC",
"name": "https://crbug.com/1233564"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30604",
"ASSIGNER": "chrome-cve-admin@google.com"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -45,10 +46,14 @@
"references": {
"reference_data": [
{
"url": "https://crbug.com/1234829"
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
},
{
"url": "https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html"
"url": "https://crbug.com/1234829",
"refsource": "MISC",
"name": "https://crbug.com/1234829"
}
]
},
@ -60,4 +65,4 @@
}
]
}
}
}

View File

@ -1,60 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-36928",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Edge (Chromium-based)",
"version": {
"version_data": [
{
"version_value": ""
}
]
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-36928",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Edge (Chromium-based)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36931."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36931."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36928"
}
]
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36928",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36928"
}
]
}
}

View File

@ -1,60 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-36929",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Edge (Chromium-based)",
"version": {
"version_data": [
{
"version_value": ""
}
]
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-36929",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Edge (Chromium-based)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36929"
}
]
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36929",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36929"
}
]
}
}

View File

@ -1,60 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-36931",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Edge (Chromium-based)",
"version": {
"version_data": [
{
"version_value": ""
}
]
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-36931",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Edge (Chromium-based)",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36928."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36928."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36931"
}
]
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36931",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36931"
}
]
}
}