"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-17 14:00:53 +00:00
parent f1fa621bcc
commit d0ef165578
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 153 additions and 66 deletions

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://www.vmware.com/security/advisories/VMSA-2021-0008.html",
"url": "https://www.vmware.com/security/advisories/VMSA-2021-0008.html"
},
{
"refsource": "MISC",
"name": "https://herolab.usd.de/security-advisories/usd-2021-0008/",
"url": "https://herolab.usd.de/security-advisories/usd-2021-0008/"
}
]
},

View File

@ -1,73 +1,75 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@octopus.com",
"ID": "CVE-2021-31818",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Octopus Deploy",
"product": {
"product_data": [
{
"product_name": "Octopus Server",
"version": {
"version_data": [
{
"version_value": ">=",
"version_affected": "2018.9.17"
},
{
"version_value": "<",
"version_affected": "2020.6.5146"
},
{
"version_value": ">=",
"version_affected": "2021.1.7149"
},
{
"version_value": "<",
"version_affected": "2021.1.7316"
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@octopus.com",
"ID": "CVE-2021-31818",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Octopus Deploy",
"product": {
"product_data": [
{
"product_name": "Octopus Server",
"version": {
"version_data": [
{
"version_value": ">=",
"version_affected": "2018.9.17"
},
{
"version_value": "<",
"version_affected": "2020.6.5146"
},
{
"version_value": ">=",
"version_affected": "2021.1.7149"
},
{
"version_value": "<",
"version_affected": "2021.1.7316"
}
]
}
}
]
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection"
}
]
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://advisories.octopus.com/adv/2021-04---SQL-Injection-in-the-Events-REST-API-(CVE-2021-31818).2013233248.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isnt parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables."
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://advisories.octopus.com/adv/2021-04---SQL-Injection-in-the-Events-REST-API-(CVE-2021-31818).2013233248.html",
"refsource": "MISC",
"name": "https://advisories.octopus.com/adv/2021-04---SQL-Injection-in-the-Events-REST-API-(CVE-2021-31818).2013233248.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn\u2019t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-34825",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/quassel/quassel/pull/581",
"refsource": "MISC",
"name": "https://github.com/quassel/quassel/pull/581"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-34826",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}