diff --git a/2020/14xxx/CVE-2020-14874.json b/2020/14xxx/CVE-2020-14874.json index a3fbe00dd69..c96ea078677 100644 --- a/2020/14xxx/CVE-2020-14874.json +++ b/2020/14xxx/CVE-2020-14874.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Vulnerability in the Oracle Cloud Infrastructure Identity and Access Management product of Oracle Cloud Services. Easily exploitable vulnerability allows high privileged attacker with network access to compromise Oracle Cloud Infrastructure Identity and Access Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Cloud Infrastructure Identity and Access Management accessible data as well as unauthorized read access to a subset of Oracle Cloud Infrastructure Identity and Access Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Cloud Infrastructure Identity and Access Management. All affected customers were notified of CVE-2020-14874 by Oracle. CVSS 3.1 Base Score 4.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L)." + "value": "Vulnerability in the Oracle Cloud Infrastructure Identity and Access Management product of Oracle Cloud Services. Easily exploitable vulnerability allows high privileged attacker with network access to compromise Oracle Cloud Infrastructure Identity and Access Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Cloud Infrastructure Identity and Access Management accessible data as well as unauthorized read access to a subset of Oracle Cloud Infrastructure Identity and Access Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Cloud Infrastructure Identity and Access Management." } ] }, diff --git a/2021/23xxx/CVE-2021-23133.json b/2021/23xxx/CVE-2021-23133.json index a1b9e82abb1..eb0756b2455 100644 --- a/2021/23xxx/CVE-2021-23133.json +++ b/2021/23xxx/CVE-2021-23133.json @@ -114,6 +114,16 @@ "refsource": "MLIST", "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "url": "http://www.openwall.com/lists/oss-security/2021/05/10/2" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", + "url": "http://www.openwall.com/lists/oss-security/2021/05/10/4" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", + "url": "http://www.openwall.com/lists/oss-security/2021/05/10/3" } ] }, diff --git a/2021/31xxx/CVE-2021-31520.json b/2021/31xxx/CVE-2021-31520.json index 74ac72b1ba6..011402d4ab4 100644 --- a/2021/31xxx/CVE-2021-31520.json +++ b/2021/31xxx/CVE-2021-31520.json @@ -1,63 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2021-31520", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro IM Security", - "version" : { - "version_data" : [ - { - "version_value" : "1.6, 1.6.5" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management interface." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Weak Session Token Authentication Bypass" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000286439" - }, - { - "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-525/" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2021-31520", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro IM Security", + "version": { + "version_data": [ + { + "version_value": "1.6, 1.6.5" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management interface." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Weak Session Token Authentication Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000286439", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000286439" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-525/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-525/" + } + ] + } +} \ No newline at end of file