"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-08-27 19:00:56 +00:00
parent 72e3d60df9
commit e5f28ff3ed
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
14 changed files with 1381 additions and 1052 deletions

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18998",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18998",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross Site Scripting (XSS) in Blog_mini v1.0 allows remote attackers to execute arbitrary code via the component '/admin/custom/blog-plugin/add'."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/xpleaf/Blog_mini/issues/44",
"refsource": "MISC",
"name": "https://github.com/xpleaf/Blog_mini/issues/44"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-18999",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-18999",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross Site Scripting (XSS) in Blog_mini v1.0 allows remote attackers to execute arbitrary code via the component '/admin/submit-articles'."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/xpleaf/Blog_mini/issues/44",
"refsource": "MISC",
"name": "https://github.com/xpleaf/Blog_mini/issues/44"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-19000",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-19000",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/tankywoo/simiki/issues/123",
"refsource": "MISC",
"name": "https://github.com/tankywoo/simiki/issues/123"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-19001",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-19001",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/tankywoo/simiki/issues/123",
"refsource": "MISC",
"name": "https://github.com/tankywoo/simiki/issues/123"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-19002",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-19002",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the 'Description' field of the component 'admin/blog/blogpost/add/'. This issue is different than CVE-2018-16632."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/stephenmcd/mezzanine/issues/1921",
"refsource": "MISC",
"name": "https://github.com/stephenmcd/mezzanine/issues/1921"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-28233",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-28233",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow vulnerability exists in ok-file-formats 1 via the ok_jpg_generate_huffman_table function in ok_jpg.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/brackeen/ok-file-formats/issues/11",
"refsource": "MISC",
"name": "https://github.com/brackeen/ok-file-formats/issues/11"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2021-28694"
"ASSIGNER": "security@xen.org",
"ID": "CVE-2021-28694",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -107,7 +108,7 @@
"description_data": [
{
"lang": "eng",
"value" : "IOMMU page mapping issues on x86\n\nT[his CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nBoth AMD and Intel allow ACPI tables to specify regions of memory\nwhich should be left untranslated, which typically means these\naddresses should pass the translation phase unaltered. While these\nare typically device specific ACPI properties, they can also be\nspecified to apply to a range of devices, or even all devices.\n\nOn all systems with such regions Xen failed to prevent guests from\nundoing/replacing such mappings (CVE-2021-28694).\n\nOn AMD systems, where a discontinuous range is specified by firmware,\nthe supposedly-excluded middle range will also be identity-mapped\n(CVE-2021-28695).\n\nFurther, on AMD systems, upon de-assigment of a physical device from a\nguest, the identity mappings would be left in place, allowing a guest\ncontinued access to ranges of memory which it shouldn't have access to\nanymore (CVE-2021-28696)."
"value": "IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696)."
}
]
},
@ -138,7 +139,9 @@
"references": {
"reference_data": [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-378.txt"
"url": "https://xenbits.xenproject.org/xsa/advisory-378.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-378.txt"
}
]
},

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2021-28695"
"ASSIGNER": "security@xen.org",
"ID": "CVE-2021-28695",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -107,7 +108,7 @@
"description_data": [
{
"lang": "eng",
"value" : "IOMMU page mapping issues on x86\n\nT[his CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nBoth AMD and Intel allow ACPI tables to specify regions of memory\nwhich should be left untranslated, which typically means these\naddresses should pass the translation phase unaltered. While these\nare typically device specific ACPI properties, they can also be\nspecified to apply to a range of devices, or even all devices.\n\nOn all systems with such regions Xen failed to prevent guests from\nundoing/replacing such mappings (CVE-2021-28694).\n\nOn AMD systems, where a discontinuous range is specified by firmware,\nthe supposedly-excluded middle range will also be identity-mapped\n(CVE-2021-28695).\n\nFurther, on AMD systems, upon de-assigment of a physical device from a\nguest, the identity mappings would be left in place, allowing a guest\ncontinued access to ranges of memory which it shouldn't have access to\nanymore (CVE-2021-28696)."
"value": "IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696)."
}
]
},
@ -138,7 +139,9 @@
"references": {
"reference_data": [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-378.txt"
"url": "https://xenbits.xenproject.org/xsa/advisory-378.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-378.txt"
}
]
},

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2021-28696"
"ASSIGNER": "security@xen.org",
"ID": "CVE-2021-28696",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -107,7 +108,7 @@
"description_data": [
{
"lang": "eng",
"value" : "IOMMU page mapping issues on x86\n\nT[his CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nBoth AMD and Intel allow ACPI tables to specify regions of memory\nwhich should be left untranslated, which typically means these\naddresses should pass the translation phase unaltered. While these\nare typically device specific ACPI properties, they can also be\nspecified to apply to a range of devices, or even all devices.\n\nOn all systems with such regions Xen failed to prevent guests from\nundoing/replacing such mappings (CVE-2021-28694).\n\nOn AMD systems, where a discontinuous range is specified by firmware,\nthe supposedly-excluded middle range will also be identity-mapped\n(CVE-2021-28695).\n\nFurther, on AMD systems, upon de-assigment of a physical device from a\nguest, the identity mappings would be left in place, allowing a guest\ncontinued access to ranges of memory which it shouldn't have access to\nanymore (CVE-2021-28696)."
"value": "IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696)."
}
]
},
@ -138,7 +139,9 @@
"references": {
"reference_data": [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-378.txt"
"url": "https://xenbits.xenproject.org/xsa/advisory-378.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-378.txt"
}
]
},

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2021-28697"
"ASSIGNER": "security@xen.org",
"ID": "CVE-2021-28697",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -105,7 +106,7 @@
"description_data": [
{
"lang": "eng",
"value" : "grant table v2 status pages may remain accessible after de-allocation\n\nGuest get permitted access to certain Xen-owned pages of memory. The\nmajority of such pages remain allocated / associated with a guest for\nits entire lifetime. Grant table v2 status pages, however, get\nde-allocated when a guest switched (back) from v2 to v1. The freeing\nof such pages requires that the hypervisor know where in the guest\nthese pages were mapped. The hypervisor tracks only one use within\nguest space, but racing requests from the guest to insert mappings of\nthese pages may result in any of them to become mapped in multiple\nlocations. Upon switching back from v2 to v1, the guest would then\nretain access to a page that was freed and perhaps re-used for other\npurposes."
"value": "grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes."
}
]
},
@ -136,7 +137,9 @@
"references": {
"reference_data": [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-379.txt"
"url": "https://xenbits.xenproject.org/xsa/advisory-379.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-379.txt"
}
]
},

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2021-28698"
"ASSIGNER": "security@xen.org",
"ID": "CVE-2021-28698",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -106,7 +107,7 @@
"description_data": [
{
"lang": "eng",
"value" : "long running loops in grant table handling\n\nIn order to properly monitor resource use, Xen maintains information on\nthe grant mappings a domain may create to map grants offered by other\ndomains. In the process of carrying out certain actions, Xen would\niterate over all such entries, including ones which aren't in use\nanymore and some which may have been created but never used. If the\nnumber of entries for a given domain is large enough, this iterating of\nthe entire table may tie up a CPU for too long, starving other domains\nor causing issues in the hypervisor itself.\n\nNote that a domain may map its own grants, i.e. there is no need for\nmultiple domains to be involved here. A pair of \"cooperating\" guests\nmay, however, cause the effects to be more severe."
"value": "long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren't in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of \"cooperating\" guests may, however, cause the effects to be more severe."
}
]
},
@ -137,7 +138,9 @@
"references": {
"reference_data": [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-380.txt"
"url": "https://xenbits.xenproject.org/xsa/advisory-380.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-380.txt"
}
]
},

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2021-28699"
"ASSIGNER": "security@xen.org",
"ID": "CVE-2021-28699",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -66,7 +67,7 @@
"description_data": [
{
"lang": "eng",
"value" : "inadequate grant-v2 status frames array bounds check\n\nThe v2 grant table interface separates grant attributes from grant\nstatus. That is, when operating in this mode, a guest has two tables.\nAs a result, guests also need to be able to retrieve the addresses that\nthe new status tracking table can be accessed through.\n\nFor 32-bit guests on x86, translation of requests has to occur because\nthe interface structure layouts commonly differ between 32- and 64-bit.\n\nThe translation of the request to obtain the frame numbers of the\ngrant status table involves translating the resulting array of frame\nnumbers. Since the space used to carry out the translation is limited,\nthe translation layer tells the core function the capacity of the array\nwithin translation space. Unfortunately the core function then only\nenforces array bounds to be below 8 times the specified value, and would\nwrite past the available space if enough frame numbers needed storing."
"value": "inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresses that the new status tracking table can be accessed through. For 32-bit guests on x86, translation of requests has to occur because the interface structure layouts commonly differ between 32- and 64-bit. The translation of the request to obtain the frame numbers of the grant status table involves translating the resulting array of frame numbers. Since the space used to carry out the translation is limited, the translation layer tells the core function the capacity of the array within translation space. Unfortunately the core function then only enforces array bounds to be below 8 times the specified value, and would write past the available space if enough frame numbers needed storing."
}
]
},
@ -97,7 +98,9 @@
"references": {
"reference_data": [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-382.txt"
"url": "https://xenbits.xenproject.org/xsa/advisory-382.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-382.txt"
}
]
},

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2021-28700"
"ASSIGNER": "security@xen.org",
"ID": "CVE-2021-28700",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -76,7 +77,7 @@
"description_data": [
{
"lang": "eng",
"value" : "xen/arm: No memory limit for dom0less domUs\n\nThe dom0less feature allows an administrator to create multiple\nunprivileged domains directly from Xen. Unfortunately, the\nmemory limit from them is not set. This allow a domain to allocate\nmemory beyond what an administrator originally configured."
"value": "xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond what an administrator originally configured."
}
]
},
@ -107,7 +108,9 @@
"references": {
"reference_data": [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-383.txt"
"url": "https://xenbits.xenproject.org/xsa/advisory-383.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-383.txt"
}
]
},

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3264",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-3264",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL Injection vulnerability in cxuucms 3.1 ivia the pid parameter in public/admin.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/cbkhwx/cxuucmsv3/issues/6",
"refsource": "MISC",
"name": "https://github.com/cbkhwx/cxuucmsv3/issues/6"
}
]
}